61
submitted 1 day ago by shapis@lemmy.ml to c/privacy@lemmy.ml

I've been using one but I'm not sure what benefits I'm getting from it. I feel like the only thing happening is I'm adding a little bit of latency to all my requests for no reason.

you are viewing a single comment's thread
view the rest of the comments
[-] TranquilTurbulence@lemmy.zip 5 points 1 day ago* (last edited 1 day ago)

If you’ve never thought about threat models, here are some questions to get you started.

  1. List the assets that require protection. (Like credit card info)
  2. Who might want to gain access to those assets? (e.g. Hackers)
  3. How can you mitigate the risks? (Updates)

You may have a lot to say, so write things down to clarify your thoughts. Once your threat model document is complete, it will be easier for you to figure it which tools you really need, and which ones are only nice to have.

this post was submitted on 27 Dec 2024
61 points (95.5% liked)

Privacy

32506 readers
1154 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS