# Backup Personal backup application ## Threat Model ### Objectives - Data is securely encrypted at rest and cannot be extracted without the repository private key - Data can be verified to come from any specific device - Without the encryption key it should be possible to make a safe guess as to what data is no longer in use. - Access to the repository private key requires hardware-backed multi-factor access - An attacker with write-access to the storage backend should not be able to modify or forge data in an unnoticeable manner - The backup clients cannot cause harm to the already backed-up data. ### Out of scope - The owner gives an attacker both the hardware key and the password to it - The backup server host is compromised - An attacker with write-access to the storage backends deleting or otherwise destroying the data contained within. - An attacker with write-access to the backed up device can modify the data that is backed up ### Diagrams #### Creating a repository ![UML Diagram of repository creation](./docs/uml/create-repo.svg)