Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

Threat Model Overview

shadowforge-rs is designed for the journalist-vs-nation-state threat model. The primary adversary has:

  • Infrastructure-scale automated steganalysis (Aletheia, StegExpose)
  • Legal authority to compel decryption
  • Traffic analysis capabilities across ISPs and platforms
  • Endpoint access (device seizure, forensic imaging)
  • Stylometric analysis capabilities
  • Jurisdictional legal pressure across borders

Threat-to-Countermeasure Map

#ThreatCountermeasureCommand / Flag
1Automated steganalysisAdaptive embedding, cover profile matching, compression survival, corpus selection--profile adaptive, --profile survivable, corpus select
2Compelled decryptionDeniable embedding, panic wipe, time-lock--deniable, panic, time-lock lock
3Traffic analysisDead drop mode, platform-aware embeddingdead-drop
4Endpoint compromiseAmnesiac mode, ZeroizeOnDrop--amnesia
5Legal/jurisdictional pressureGeographic threshold distribution, canary shards--geo-manifest, --canary
6Stylometric identificationStyloScrubberscrub, --scrub-style
7Internal leak attributionForensic watermarkerwatermark embed/detect

What shadowforge Does NOT Protect Against

See Residual Risks for limitations and scenarios where shadowforge is insufficient.