logo

How to PROPERLY threat model

time4 mo agoview48 views

How to threat model - one of the most misunderstood concepts in the entire privacy & security community. Welcome to our complete guide to it!

This video is sponsored by Cake Wallet: an open source, non-custodial cryptocurrency wallet for Monero, Bitcoin, & Litecoin! Give it a shot today! https://cakewallet.com/

00:00 Introduction 00:55 Our Sponsor! 01:21 Why Threat Model? 03:05 Developing a Threat Model 07:22 Using Your New Threat Model 09:10 Our Sponsor! 09:45 Threat Model Bias & Where People Go Wrong

Go Incognito: https://techlore.tech/goincognito.html The New Oil Security/Privacy/Anonymity: https://youtu.be/pFGkdNEfFa0 EFF Threat Modeling: https://ssd.eff.org/en/module/your-security-plan PrivacyGuides Threat Modeling: https://www.privacyguides.org/threat-modeling/ ArsTechnica Threat Modeling: https://arstechnica.com/information-technology/2017/07/how-i-learned-to-stop-worrying-mostly-and-love-my-threat-model/

🔐 Our Website: https://techlore.tech 🏫 Techlore Coaching - to get direct support: https://techlore.tech/coaching 🕵 Go Incognito Course - to learn about privacy: https://techlore.tech/goincognito

Connect with our privacy community: ✉️ Blog: https://dispatch.techlore.tech 💻 Forum: https://discuss.techlore.tech Ⓜ️ Mastodon: https://social.lol/@techlore

We provide all content & resources for free, please consider supporting our work to help us expand our content: 🧡 Patreon: https://www.patreon.com/techlore 💖 All Other Support Methods: https://techlore.tech/support #threatmodel #privacy #security

Loading comments...