Submitted by knowledge in Privacy

Hello everyone,

I'm curious to find out how 'threat modeling' works and what it actually is. Because, I'm hearing a lot of this term when it comes to talking about privacy and finding possible solutions to specific questions. But most of the time they don't give a explanation what it actually is. Another question I got is, what is your approach to this topic? How are you using this method to find the right solutions for your personal situation? It would be really appreciated if you could help me out with this. By the way, I have read the FAQ and I'm really impressed with the good quality from it. I think that everything seems to be better here in terms of design. And privacy of course.



You must log in or register to comment.