aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorSilvio Rhatto <rhatto@riseup.net>2016-07-07 10:11:00 -0300
committerSilvio Rhatto <rhatto@riseup.net>2016-07-07 10:11:00 -0300
commitd8d51abfd62c4bfa339192db1187057d0346b34e (patch)
tree6603564f0f672286db8bbcc0eb2988b52d9d0d6d
parent37ef96e91ceca43c8e1a71398534bff89d7fa8c1 (diff)
downloadbootless-d8d51abfd62c4bfa339192db1187057d0346b34e.tar.gz
bootless-d8d51abfd62c4bfa339192db1187057d0346b34e.tar.bz2
Updates threat model
-rw-r--r--index.mdwn2
1 files changed, 1 insertions, 1 deletions
diff --git a/index.mdwn b/index.mdwn
index 9337e16..94dbe8a 100644
--- a/index.mdwn
+++ b/index.mdwn
@@ -72,7 +72,7 @@ Threat Model
### Does bootless mitigate all types of Evil Maid attacks? No.
-1. It reduces the attack surface by placing the bootloader away from the physical machine and recommending you to use Full Disk Encryption (FDE) to store your operating system, swap and data.
+1. It reduces the attack surface by placing the bootloader and images away from the physical machine and recommending you to use Full Disk Encryption (FDE) to store your operating system, swap and data.
2. Infection is still possible in plenty of unencrypted/unauthenticated software residing in the machine, such as BIOS, network firmware and potential backdoors such as Intel's AMT/ME.