minor fixes
This commit is contained in:
parent
97b674b81f
commit
cea714263b
|
@ -5,7 +5,6 @@
|
|||
{%- include header.html -%}
|
||||
<div class="container">
|
||||
<main class="blog">
|
||||
<article class="post">
|
||||
<div id="blog-header">
|
||||
<span class="blog-header-title">the <img width="30px" src="assets/base/distrust-white.svg"/> Distrust blog</span>
|
||||
<div class="blog-header-subtitle">Provable security, explained.</div>
|
||||
|
@ -18,7 +17,7 @@
|
|||
<div class="blog-details-read-time">{{ post.read_time }} min read</div>
|
||||
</div>
|
||||
<a class="blog-link" href="{{ post.url | relative_url }}" title="{{ post.title }}">
|
||||
<article class="post">
|
||||
<article>
|
||||
<h1>{{ post.title }}</h1>
|
||||
<p>{{ post.excerpt | strip_html | truncatewords: 35 }}</p>
|
||||
</article>
|
||||
|
@ -36,7 +35,6 @@
|
|||
— {{ author.name }}{% unless forloop.last %}, {% endunless %}
|
||||
{% endfor %}
|
||||
</p>
|
||||
</article>
|
||||
</main>
|
||||
{%- include footer.html -%}
|
||||
</div>
|
||||
|
|
|
@ -8,7 +8,7 @@ authors:
|
|||
- name: Anton Livaja
|
||||
---
|
||||
|
||||
The ByBit incident is an example of a nation state actor using a series of sophisticated attacks to compromise high value targets. When the value at stake is such that it justifys spending funds on buying 0-days, in some cases multiples, and combining them into elaborate exploit chains, attacking multiple different layers of the tech stack, highly targetted social engineering, compromise of individuals, planting of moles or even phsyical attacks, the threat model which needs to be assume to adequately address risks needs to be extreme.
|
||||
The Bybit incident is an example of a nation state actor using a series of sophisticated attacks to compromise high value targets. When the value at stake is such that it justifies spending funds on buying 0-days, in some cases multiples, and combining them into elaborate exploit chains, attacking multiple different layers of the tech stack, highly targetted social engineering, compromise of individuals, planting of moles or even phsyical attacks, the threat model which needs to be assume to adequately address risks needs to be extreme.
|
||||
|
||||
### Threat Model Assumptions
|
||||
The assumptions we make about nation state actors at Distrust:
|
||||
|
|
|
@ -1504,11 +1504,11 @@ pre {
|
|||
|
||||
.blog {
|
||||
margin: auto;
|
||||
max-width: 800px;
|
||||
max-width: 700px;
|
||||
}
|
||||
|
||||
.post {
|
||||
max-width: 800px;
|
||||
max-width: 700px;
|
||||
margin: 100px 0px;
|
||||
}
|
||||
|
||||
|
|
Loading…
Reference in New Issue