http://msec2nnqtbwh5c5yxpiswzwnqperok5k33udj7t6wmqcleu3ifj34sqd.onion/posts/opsec/cloud_provider_adversary/index.html
Threats to integrity Someone with Bob’s level of access (he is the administrator of the hypervisor - the software that runs Alice’s virtual server) could
also: Run an evil maid attack: inject thir own code in the bootloader, in
Alice’s OS image or inside the hypervisor which Alice can’t
monitor Through the hypervisor, tamper with Alice’s virtual machine to
compromise it Threats to availability Having access to the physical layer of the network as well as the power
grid feeding the servers,...