This document discusses various threats to online security and privacy. It notes that while many people think of threats from national security, police or hackers, threats can also come from public bodies, ideologues, and others seeking information for profit or other motives. Various methods are discussed that could be used against individuals, including backdoors, intercepting passwords, social engineering, theft, and exploiting metadata. It emphasizes the importance of considering who might want personal information and how it could be compromised when modeling security threats.