Your threat model should include sophisticated technical attackers. But don't forget to include the unsophisticated non-technical religious mob.

Replies (1)