minor fixes
This commit is contained in:
parent
97b674b81f
commit
cea714263b
|
@ -5,7 +5,6 @@
|
||||||
{%- include header.html -%}
|
{%- include header.html -%}
|
||||||
<div class="container">
|
<div class="container">
|
||||||
<main class="blog">
|
<main class="blog">
|
||||||
<article class="post">
|
|
||||||
<div id="blog-header">
|
<div id="blog-header">
|
||||||
<span class="blog-header-title">the <img width="30px" src="assets/base/distrust-white.svg"/> Distrust blog</span>
|
<span class="blog-header-title">the <img width="30px" src="assets/base/distrust-white.svg"/> Distrust blog</span>
|
||||||
<div class="blog-header-subtitle">Provable security, explained.</div>
|
<div class="blog-header-subtitle">Provable security, explained.</div>
|
||||||
|
@ -18,7 +17,7 @@
|
||||||
<div class="blog-details-read-time">{{ post.read_time }} min read</div>
|
<div class="blog-details-read-time">{{ post.read_time }} min read</div>
|
||||||
</div>
|
</div>
|
||||||
<a class="blog-link" href="{{ post.url | relative_url }}" title="{{ post.title }}">
|
<a class="blog-link" href="{{ post.url | relative_url }}" title="{{ post.title }}">
|
||||||
<article class="post">
|
<article>
|
||||||
<h1>{{ post.title }}</h1>
|
<h1>{{ post.title }}</h1>
|
||||||
<p>{{ post.excerpt | strip_html | truncatewords: 35 }}</p>
|
<p>{{ post.excerpt | strip_html | truncatewords: 35 }}</p>
|
||||||
</article>
|
</article>
|
||||||
|
@ -36,7 +35,6 @@
|
||||||
— {{ author.name }}{% unless forloop.last %}, {% endunless %}
|
— {{ author.name }}{% unless forloop.last %}, {% endunless %}
|
||||||
{% endfor %}
|
{% endfor %}
|
||||||
</p>
|
</p>
|
||||||
</article>
|
|
||||||
</main>
|
</main>
|
||||||
{%- include footer.html -%}
|
{%- include footer.html -%}
|
||||||
</div>
|
</div>
|
||||||
|
|
|
@ -8,7 +8,7 @@ authors:
|
||||||
- name: Anton Livaja
|
- name: Anton Livaja
|
||||||
---
|
---
|
||||||
|
|
||||||
The ByBit incident is an example of a nation state actor using a series of sophisticated attacks to compromise high value targets. When the value at stake is such that it justifys spending funds on buying 0-days, in some cases multiples, and combining them into elaborate exploit chains, attacking multiple different layers of the tech stack, highly targetted social engineering, compromise of individuals, planting of moles or even phsyical attacks, the threat model which needs to be assume to adequately address risks needs to be extreme.
|
The Bybit incident is an example of a nation state actor using a series of sophisticated attacks to compromise high value targets. When the value at stake is such that it justifies spending funds on buying 0-days, in some cases multiples, and combining them into elaborate exploit chains, attacking multiple different layers of the tech stack, highly targetted social engineering, compromise of individuals, planting of moles or even phsyical attacks, the threat model which needs to be assume to adequately address risks needs to be extreme.
|
||||||
|
|
||||||
### Threat Model Assumptions
|
### Threat Model Assumptions
|
||||||
The assumptions we make about nation state actors at Distrust:
|
The assumptions we make about nation state actors at Distrust:
|
||||||
|
|
|
@ -1504,11 +1504,11 @@ pre {
|
||||||
|
|
||||||
.blog {
|
.blog {
|
||||||
margin: auto;
|
margin: auto;
|
||||||
max-width: 800px;
|
max-width: 700px;
|
||||||
}
|
}
|
||||||
|
|
||||||
.post {
|
.post {
|
||||||
max-width: 800px;
|
max-width: 700px;
|
||||||
margin: 100px 0px;
|
margin: 100px 0px;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue