Submitted by knowledge in Privacy

Hello everyone,

I'm curious to find out how 'threat modeling' works and what it actually is. Because, I'm hearing a lot of this term when it comes to talking about privacy and finding possible solutions to specific questions. But most of the time they don't give a explanation what it actually is. Another question I got is, what is your approach to this topic? How are you using this method to find the right solutions for your personal situation? It would be really appreciated if you could help me out with this. By the way, I have read the FAQ and I'm really impressed with the good quality from it. I think that everything seems to be better here in terms of design. And privacy of course.

5

Comments

You must log in or register to comment.

An_Old_Big_Tree wrote

I'm not sure how general your question is, you might have more luck in f/security_culture, the sidebar link to zines on security culture is quite good.

3

knowledge OP wrote

Okay, thank you for the tip. I will check it out soon.

2

knowledge OP wrote

I have subscribed to the forum you have given me. I will check it out later this week. Thank you for the hint.

2

raindropq wrote

saw one on there that says Lefist activist have to be impersonal, compartmentalized. as like machines.

to me, it sounds horrible. not my trip to the pool

1