Skip to content

Document a threat model #283

Open
Open

Description

There are undoubtedly risks associated with usage of this cold storage protocol, with threats originating from the initialization (key gen, software installation and verification, etc.) to the operation (transactions and the signing ceremonies). I wonder if there is any plan to document a threat model - discussing known threats and/or threat categories - so that a business wishing to use subzero can better understand the risks involved? This approach could also benefit potential users by enabling them to harden their operation with additional procedural or technical countermeasures to mitigate these risks.

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions