Changes
Page history
Add build infra as a possible adversary position
authored
May 18, 2024
by
Richard Pospesel
Show whitespace changes
Inline
Side-by-side
Design-Documents/Tor-Browser-Design-Doc.md
View page @
c7878fea
...
...
@@ -245,7 +245,7 @@ The browser's adversaries have a number of possible goals, capabilities, and att
### 3.2 Adversary Positioning
Adversaries may position themselves at a number of
different
locations in order to execute their attacks.
Adversaries may position themselves at a number of
possible
locations in order to execute their attacks.
1.
**Malicious 1st party websites**
...
...
@@ -284,6 +284,11 @@ Adversaries may position themselves at a number of different locations in order
Such adversaries would include system administrators, other users of a shared system, or domestic partners.
They may also be able to compel users to surrender their encryption keys.
8.
**Build Infrastructure**
Adversaries may have access to release infrastructure such as build servers, source code repositories, or developer computers.
They may attempt to modify the contents of files or communications on the affected machines.
### 3.3 Adversary Attacks
The adversary can perform the following attacks from a number of different positions to accomplish various aspects of their goals.
...
...
...
...