FAQ: Technical Questions & Answers
What is GoodCrypto's threat model?
Global passive and active attackers.
Attackers include states, businesses, and ordinary criminals.
There is at least one global passive attacker, NSA. They strive to tap and store everything.
Counters to global passive attacks include:
- Encrypt (examples: TLS, GPG)
- Use combinatorial explosions such as mixing (examples: groups, Tor)
NSA is also the worst active attacker, although there are many. They sabotage and crack standards, products, and services. They inject packets and infect systems with malware. They embed compromised keys and bugs in hardware, at the factory and in transit.
Counters to active attacks include:
- Use tested and trusted products and services
- Avoid state sponsored standards
- Use firewalls
- Virtualize systems