<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Threats on Stepperbox</title>
    <link>/threats/</link>
    <description>Recent content in Threats on Stepperbox</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <atom:link href="/threats/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Adversaries</title>
      <link>/threats/adversaries/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/threats/adversaries/</guid>
      <description>&lt;p&gt;Who the threats come from — nation-states, corporations, criminal organizations, and local actors. Understanding adversary capabilities, motivations, and resources as the basis for any threat model.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Surveillance</title>
      <link>/threats/surveillance/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/threats/surveillance/</guid>
      <description>&lt;p&gt;State and corporate surveillance — network monitoring, metadata collection, device tracking, IMSI catchers, and the infrastructure of mass observation. Understanding what is collected and how.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Forensics</title>
      <link>/threats/forensics/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/threats/forensics/</guid>
      <description>&lt;p&gt;Digital forensics techniques — disk imaging, file recovery, memory analysis, network traffic reconstruction, and mobile device extraction. What investigators can find and how to understand the threat model.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Firewalls</title>
      <link>/threats/firewalls/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/threats/firewalls/</guid>
      <description>&lt;p&gt;State-level firewalls and deep packet inspection — the Great Firewall, Iran&amp;rsquo;s filtering infrastructure, and how nation-states block, throttle, and inspect internet traffic at scale.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Moderation</title>
      <link>/threats/moderation/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/threats/moderation/</guid>
      <description>&lt;p&gt;Platform content moderation — automated filtering, hash matching, AI classifiers, deplatforming, and the mechanisms by which speech and content are controlled on centralized services.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Censorship</title>
      <link>/threats/censorship/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/threats/censorship/</guid>
      <description>&lt;p&gt;Censorship beyond the firewall — DNS poisoning, search delisting, app store removal, payment processor bans, domain seizures, and the many layers at which information can be suppressed.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Supply Chain</title>
      <link>/threats/supply-chain/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/threats/supply-chain/</guid>
      <description>&lt;p&gt;Supply chain compromise — backdoored hardware, tampered firmware, malicious dependencies, and interdiction of components in transit. How adversaries insert themselves between manufacturer and end user.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Software Attacks</title>
      <link>/threats/software-attacks/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/threats/software-attacks/</guid>
      <description>&lt;p&gt;Software exploitation — malware, zero-days, phishing, side-channel attacks, and remote code execution. The attack surface of operating systems, browsers, and networked applications.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Hardware Attacks</title>
      <link>/threats/hardware-attacks/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>/threats/hardware-attacks/</guid>
      <description>&lt;p&gt;Physical and electrical attacks on hardware — JTAG extraction, bus sniffing, fault injection, chip decapping, and side-channel analysis. What an adversary with physical access can do to your devices.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
