1. Introduction, Threat Models