CARVIEW |
Select Language
HTTP/2 200
cache-control: max-age=300, public, stale-while-revalidate=30
content-type: text/html; charset=utf-8
etag: W/"0d150bc2a59c779cca5852044a13006b"
last-modified: Mon, 06 Mar 2023 21:22:24 GMT
link: ; rel=preload; as=style; nopush
referrer-policy: strict-origin-when-cross-origin
x-content-type-options: nosniff
x-download-options: noopen
x-frame-options: SAMEORIGIN
x-permitted-cross-domain-policies: none
x-request-id: 9cbdb790-8da3-4a1f-8bd6-1eb883ae2809
x-runtime: 0.041325
x-xss-protection: 0
accept-ranges: bytes
age: 0
date: Wed, 08 Oct 2025 22:19:43 GMT
via: 1.1 varnish
x-served-by: cache-bom-vanm7210029-BOM
x-cache: MISS
x-cache-hits: 0
x-timer: S1759961983.594935,VS0,VE1306
strict-transport-security: max-age=300
content-length: 16785
Adversary | Surveillance Self-Defense
Skip to main content

Surveillance
Self-Defense
Self-Defense
Adversary
Your adversary is the person or organization attempting to undermine your security goals. Adversaries can be different, depending on the situation. For instance, you may worry about criminals spying on the network at a cafe, or your classmates logging into your accounts on a shared computer at a school. Often the adversary is hypothetical.