Skip to main content

All Questions

Filter by
Sorted by
Tagged with
0 votes
1 answer
144 views

Is there a foundational threat model for families/domestic users?

I am aware through hearsay of the threats exposed by certain digital assets. For example, not only should a password be kept secret, but it should not be re-used. Having the scenario unpacked for me, ...
user avatar
1 vote
2 answers
529 views

Understanding risk analysis and threat modelling in practice

I am doing research in the security of cloud computing. The purpose of the following questions is to understand the relationship between "risk analysis" and "threat modeling": Do we usually analyze ...
Michael's user avatar
  • 423
29 votes
7 answers
5k views

When do honest people need privacy or anonymity? (e.g. they have nothing to hide) [closed]

I'm having a discussion with someone who thinks they don't need technical measures of privacy or anonymity. Common arguments against needing to care about privacy or anonymity include: Everything ...
makerofthings7's user avatar
5 votes
3 answers
751 views

Is there any way of preventing (or punishing) abuse of anonymity networks? [closed]

Anonymity services/networks like Tor, VPNs that don't log etc., seem like very double edged swords. Is there any way to prevent people with bad intentions (like breaking the law) from using them or ...
Celeritas's user avatar
  • 10.2k