| User logs in using username/password |  Network Compromised |  Traffic Intercept via MITM |  Medium |  None |  Yes. |  HTTPS for transport, username and password can be used to retreive credentials but not decrypt credentials. |   |   | 
 | User logs in using username/password |  Network Compromised |  Traffic Intercept via MITM w/Replay Attack |  High |  None |  Yes. |  Randomly salted username/password prevents replay attacks. |   |   | 
 | Login server is hacked. |  Server Compromised |  "owned" server. (many) |  High |  None |  Yes. |  Login data at rest is encrypted w/keys not on server. |   |   | 
 | User downloads data from server. |  Network Compromised |  Traffic Intercept via MITM. Data is read. |  Medium |  None |  Yes. |  HTTPS for transport, sensitive data is in a (further) encrypted form. |  AES keys randomized for each request. RSA-2048 is strong (as of 2016). |  Subject to NSA-style long term storage attack. | 
 | User downloads data from server. |  Network Compromised |  Traffic Intercept via MITM. Request is replayed for additional information. |  Medium |  None |  Yes. |  Requests are signed, preventing request being used for any information other than the initially requested information. |   |   | 
 | User downloads data from server. |  Network Compromised |  Traffic Intercept via MITM. Data is manipulated. |  Medium |  None |  Yes. |  Requests are signed, preventing request being used for any information other than the initially requested information. Response data is also signed. |   |   | 
 | User downloads data from server. |  Network Compromised |  Traffic Intercept via MITM. Data is omitted or redirected. |  Medium |  Data is not stored. |  Yes. |  Data is signed and sensitive data is encrypted. |   |   | 
 | User downloads data from server. |  Server Compromised |  Malicious Server |  High |  Data may be unavailable. |  Yes. |  Data is signed and sensitive data is encrypted. User IP/fingerprints can be acquired for correlation attacks. |   |  Subject to NSA-style long term storage attack. | 
 | User uploads data to server. |  Network Compromised |  Traffic Intercept via MITM. Data is read. |  Medium |  None |  Yes. |  HTTPS for transport, sensitive data is in a (further) encrypted form. |  AES keys randomized for each request. RSA-2048 is strong (as of 2016). |  Subject to NSA-style long term storage attack. | 
 | User uploads data to server. |  Network Compromised |  Traffic Intercept via MITM. Data is read and HTTPS is skimmed or a certificate attack works. |  High |  None |  Yes. |  Sensitive data is in an encrypted form. |  AES keys randomized for each request. RSA-2048 is strong (as of 2016). |  Subject to NSA-style long term storage attack. | 
 | User uploads data to server. |  Network Compromised |  Traffic Intercept via MITM. Request is replayed to overwrite changes. |  High |  None |  Yes. |  Request signature is timestamped, limiting the viability of this attack to some number of seconds after the initial capture. |   |   | 
 | User uploads data to server. |  Network Compromised |  Traffic Intercept via MITM. Data is manipulated. |  High |  None |  Yes. |  Request signature is timestamped, limiting the viability of this attack to some number of seconds after the initial capture. |   |   | 
 | User uploads data to server. |  Network Compromised |  Traffic Intercept via MITM. Data is omitted or redirected. |  Medium |  Data is not stored. |  Yes. |   |   |   | 
 | User deletes data. |  Network Compromised |  Traffic Intercept via MITM. Data is read. |  Medium |  None |  Yes. |  HTTPS for transport, sensitive data is in a (further) encrypted form. |  AES keys randomized for each request. RSA-2048 is strong (as of 2016). |   | 
 | User deletes data. |  Network Compromised |  Traffic Intercept via MITM. Request is replayed to delete additional material. |  High |  None |  Yes. |  Request signature is timestamped, limiting the viability of this attack to some number of seconds after the initial capture. Request signature also denotes the material to be deleted. |   |   | 
 | User deletes data. |  Network Compromised |  Traffic Intercept via MITM. Data is manipulated. |  High |  None |  Yes. |  Request signature is timestamped, limiting the viability of this attack to some number of seconds after the initial capture. |   |   | 
 | User deletes data. |  Network Compromised |  Traffic Intercept via MITM. Data is omitted or redirected. |  Medium |  Can be aborted, retaining data. |  Yes. |  Data is signed and sensitive data is encrypted. |   |   | 
 | User deletes data. |  Server Compromised |  Malicious Server |  High |  Can be aborted, retaining data. |  Yes. |  Data is signed and sensitive data is encrypted. |   |   |