feat: add blog #7

Manually merged
anton merged 32 commits from feat/blog into main 2025-04-03 03:34:49 +00:00
3 changed files with 4 additions and 6 deletions
Showing only changes of commit 9ca7d9134a - Show all commits

View File

@ -5,7 +5,6 @@
{%- include header.html -%}
<div class="container">
<main class="blog">
<article class="post">
<div id="blog-header">
<span class="blog-header-title">the <img width="30px" src="assets/base/distrust-white.svg"/> Distrust blog</span>
<div class="blog-header-subtitle">Provable security, explained.</div>
@ -18,7 +17,7 @@
<div class="blog-details-read-time">{{ post.read_time }} min read</div>
</div>
<a class="blog-link" href="{{ post.url | relative_url }}" title="{{ post.title }}">
<article class="post">
<article>
<h1>{{ post.title }}</h1>
<p>{{ post.excerpt | strip_html | truncatewords: 35 }}</p>
</article>
@ -36,7 +35,6 @@
— {{ author.name }}{% unless forloop.last %}, {% endunless %}
{% endfor %}
</p>
</article>
</main>
{%- include footer.html -%}
</div>

View File

@ -8,7 +8,7 @@ authors:
- name: Anton Livaja
---
The ByBit incident is an example of a nation state actor using a series of sophisticated attacks to compromise high value targets. When the value at stake is such that it justifys spending funds on buying 0-days, in some cases multiples, and combining them into elaborate exploit chains, attacking multiple different layers of the tech stack, highly targetted social engineering, compromise of individuals, planting of moles or even phsyical attacks, the threat model which needs to be assume to adequately address risks needs to be extreme.
The Bybit incident is an example of a nation state actor using a series of sophisticated attacks to compromise high value targets. When the value at stake is such that it justifies spending funds on buying 0-days, in some cases multiples, and combining them into elaborate exploit chains, attacking multiple different layers of the tech stack, highly targetted social engineering, compromise of individuals, planting of moles or even phsyical attacks, the threat model which needs to be assume to adequately address risks needs to be extreme.
### Threat Model Assumptions
The assumptions we make about nation state actors at Distrust:

View File

@ -1656,11 +1656,11 @@ pre {
.blog {
margin: auto;
max-width: 800px;
max-width: 700px;
}
.post {
max-width: 800px;
max-width: 700px;
margin: 100px 0px;
}