User logs in using username/password | Network Compromised | Traffic Intercept via MITM | Medium | None | Yes. | HTTPS for transport, username and password can be used to retreive credentials but not decrypt credentials. | | |
User logs in using username/password | Network Compromised | Traffic Intercept via MITM w/Replay Attack | High | None | Yes. | Randomly salted username/password prevents replay attacks. | | |
Login server is hacked. | Server Compromised | "owned" server. (many) | High | None | Yes. | Login data at rest is encrypted w/keys not on server. | | |
User downloads data from server. | Network Compromised | Traffic Intercept via MITM. Data is read. | Medium | None | Yes. | HTTPS for transport, sensitive data is in a (further) encrypted form. | AES keys randomized for each request. RSA-2048 is strong (as of 2016). | Subject to NSA-style long term storage attack. |
User downloads data from server. | Network Compromised | Traffic Intercept via MITM. Request is replayed for additional information. | Medium | None | Yes. | Requests are signed, preventing request being used for any information other than the initially requested information. | | |
User downloads data from server. | Network Compromised | Traffic Intercept via MITM. Data is manipulated. | Medium | None | Yes. | Requests are signed, preventing request being used for any information other than the initially requested information. Response data is also signed. | | |
User downloads data from server. | Network Compromised | Traffic Intercept via MITM. Data is omitted or redirected. | Medium | Data is not stored. | Yes. | Data is signed and sensitive data is encrypted. | | |
User downloads data from server. | Server Compromised | Malicious Server | High | Data may be unavailable. | Yes. | Data is signed and sensitive data is encrypted. User IP/fingerprints can be acquired for correlation attacks. | | Subject to NSA-style long term storage attack. |
User uploads data to server. | Network Compromised | Traffic Intercept via MITM. Data is read. | Medium | None | Yes. | HTTPS for transport, sensitive data is in a (further) encrypted form. | AES keys randomized for each request. RSA-2048 is strong (as of 2016). | Subject to NSA-style long term storage attack. |
User uploads data to server. | Network Compromised | Traffic Intercept via MITM. Data is read and HTTPS is skimmed or a certificate attack works. | High | None | Yes. | Sensitive data is in an encrypted form. | AES keys randomized for each request. RSA-2048 is strong (as of 2016). | Subject to NSA-style long term storage attack. |
User uploads data to server. | Network Compromised | Traffic Intercept via MITM. Request is replayed to overwrite changes. | High | None | Yes. | Request signature is timestamped, limiting the viability of this attack to some number of seconds after the initial capture. | | |
User uploads data to server. | Network Compromised | Traffic Intercept via MITM. Data is manipulated. | High | None | Yes. | Request signature is timestamped, limiting the viability of this attack to some number of seconds after the initial capture. | | |
User uploads data to server. | Network Compromised | Traffic Intercept via MITM. Data is omitted or redirected. | Medium | Data is not stored. | Yes. | | | |
User deletes data. | Network Compromised | Traffic Intercept via MITM. Data is read. | Medium | None | Yes. | HTTPS for transport, sensitive data is in a (further) encrypted form. | AES keys randomized for each request. RSA-2048 is strong (as of 2016). | |
User deletes data. | Network Compromised | Traffic Intercept via MITM. Request is replayed to delete additional material. | High | None | Yes. | Request signature is timestamped, limiting the viability of this attack to some number of seconds after the initial capture. Request signature also denotes the material to be deleted. | | |
User deletes data. | Network Compromised | Traffic Intercept via MITM. Data is manipulated. | High | None | Yes. | Request signature is timestamped, limiting the viability of this attack to some number of seconds after the initial capture. | | |
User deletes data. | Network Compromised | Traffic Intercept via MITM. Data is omitted or redirected. | Medium | Can be aborted, retaining data. | Yes. | Data is signed and sensitive data is encrypted. | | |
User deletes data. | Server Compromised | Malicious Server | High | Can be aborted, retaining data. | Yes. | Data is signed and sensitive data is encrypted. | | |