CARVIEW |
Select Language
HTTP/2 200
cache-control: max-age=300, public, stale-while-revalidate=30
content-type: text/html; charset=utf-8
etag: W/"0d150bc2a59c779cca5852044a13006b"
last-modified: Mon, 06 Mar 2023 21:22:24 GMT
link: ; rel=preload; as=style; nopush
referrer-policy: strict-origin-when-cross-origin
x-content-type-options: nosniff
x-download-options: noopen
x-frame-options: SAMEORIGIN
x-permitted-cross-domain-policies: none
x-request-id: 7b69501a-b3cb-40f9-8b9b-d6b3bdf9a306
x-runtime: 0.038045
x-xss-protection: 0
accept-ranges: bytes
age: 0
date: Tue, 07 Oct 2025 05:20:38 GMT
via: 1.1 varnish
x-served-by: cache-bom-vanm7210058-BOM
x-cache: MISS
x-cache-hits: 0
x-timer: S1759814438.630021,VS0,VE1235
strict-transport-security: max-age=300
content-length: 16896
Adversary | Surveillance Self-Defense
Skip to main content

Surveillance
Self-Defense
Self-Defense
Adversary
Your adversary is the person or organization attempting to undermine your security goals. Adversaries can be different, depending on the situation. For instance, you may worry about criminals spying on the network at a cafe, or your classmates logging into your accounts on a shared computer at a school. Often the adversary is hypothetical.