01Multi-tier threat modeling ranging from local observers to global passive adversaries
02Comprehensive surveillance surface taxonomy covering network, app, and device layers
03Structured audit methodology for mapping data flows and assessing encryption coverage
04Extensive hardening checklist for protocols, infrastructure, and legal jurisdiction
05Code review patterns for identifying and fixing metadata leakage anti-patterns
067 GitHub stars