Zerotail Threat Model

The Zerotail Threat Model helps organizations and high‑risk individuals systematically reduce their attack surface so entire classes of attacks become impractical. Unlike conventional frameworks that focus on preventing individual risks, Zerotail assumes parts of your system are already compromised and designs resilient systems from that position.

Philosophy: Designing for Compromise

Zerotail reframes security planning from "what could go wrong?" to "what will be compromised?" This pessimistic assumption produces systems and operational practices that remain resilient even against worst‑case adversaries.

Hardware Reality: Modern laptops and mobile systems contain opaque components—CPU microcode, Intel Management Engine (ME), peripheral firmware, and motherboard EC chips—that can be difficult or impossible to fully verify. Zerotail incorporates these considerations into our threat model by minimizing trust where possible and verifying critical components. Supply‑chain threats and firmware tampering are treated as real and actionable risks, especially for high‑risk users.

We provide consulting and custom hardened hardware for journalists, politicians, investigators, and other high‑risk clients. Our work couples Zerotail's resilience‑first philosophy with hands‑on hardware hardening and operational guidance so clients can work, travel, and collaborate with realistic protections against sophisticated adversaries.


The Four Levels

Zerotail provides a phased path for improving resilience. Each level corresponds to an increasingly capable adversary. Different components can be assigned different protection levels based on the consequence of compromise.

Level 1 – Defense Against Remote, Low‑Resource Adversaries

Level 2 – Defense Against Insiders or Compromised Hosts

Level 3 – Defense Against Well‑Funded Organizations

Level 4 – Defense Against Nation‑State Actors


Hardware and Firmware Considerations

Building on hardened‑device research, Zerotail explicitly models hardware trust boundaries:

Custom hardware mitigations include Coreboot/Heads‑style firmware, write‑protecting ROMs, TPMTOTP attestation, careful IOMMU configuration, selective peripheral minimization, and lifecycle controls for secure transport and decommissioning.


Threats We Address

Integration of hardware assurance, software compartmentalization, and operational security reduces attack effectiveness and protects confidentiality, integrity, and availability.


Hardened Devices — Goals, Threats, and Defences

Goals: Enable individuals or groups to work securely under surveillance by powerful adversaries (journalists, political staffers, investigators). Protect research, communications, travel, and operational links.

Key Threat Categories:

  1. Linkability & Tracking
  2. Malware / APTs
  3. Physical Access Attacks
  4. Remote Management / Invisible Subsystems

Defence Principles: Layered defence, assume compromise of layers, limit damage.

Core actions:


Applying Zerotail to Your Situation

Different Zerotail levels can be applied across systems and workflows, applying strongest controls where compromise is most damaging.


Why Zerotail Works

Designing with expected compromise produces resilient systems and realistic operational practices. Operational, digital, and hardware security combine for strategic resilience.


Contact & Consulting

Zerotail provides 1:1 consulting to help clients select the right hardware, firmware, and workflows for their threat model, including scoping assessment, documented recommendations, hands‑on hardening guidance, and post‑deployment coaching.

Request Zerotail threat model consultation →