Threat Analysis
Know your adversary to defend yourself
Effective privacy and security require understanding the threats you face. This section covers surveillance techniques, common attacks, and adversary capabilities to help you make informed decisions about your digital security.
Threat Categories
Mass Surveillance
Government and corporate programs that monitor populations at scale.
Tracking & Fingerprinting
Techniques used to identify and follow users across the web.
Malware & Exploits
Malicious software targeting privacy tools and their users.
Social Engineering
Attacks that exploit human psychology rather than technology.
Traffic Analysis
Analyzing network patterns to deanonymize users.
Legal Threats
Compelled disclosure, warrants, and legal jurisdiction issues.
Threat Actors
Nation States
Government intelligence agencies with vast resources
High CapabilityCorporations
Data collection for advertising and profiling
Medium CapabilityCriminals
Hackers seeking financial gain or data theft
VariableISPs
Internet providers logging traffic and selling data
MediumLaw Enforcement
Police and federal agencies investigating crimes
VariablePersonal
Stalkers, abusers, and personal adversaries
Low-Medium