@axleyjc the threat has physical access to your machine. threat modeling helps when you are trying to design your defenses, not when the thief has run away with your computer.