Security/ProcessIsolation/ThreatModel: Difference between revisions

No edit summary
Line 48: Line 48:
Attack vectors can be thought of in two ways:
Attack vectors can be thought of in two ways:
* to enumerate what things could be used to attack the browser in the first place
* to enumerate what things could be used to attack the browser in the first place
* once compromised, what assets does a process have access to for launching further attacks
* once compromised, what assets does a process have to launch further attacks


A very partial list of assets that could be considered attack vectors... please expand upon!
A very partial list of assets that could be considered attack vectors... please expand upon!
Confirmed users
717

edits