The Threat model allows the adversary to super-locally eavesdrop, while also being able to compromise nodes. In Super-local eavesdropping, the adversary eavesdrops over a local area but can overhear communication over significantly larger coverage area than a sensor node[3]. An example of an adversary is a laptop class attacker. When a node is compromised, an adversary has access to all the cryptographic information available to the node.