All Questions
Tagged with threat-modeling privacy
4 questions
0
votes
1
answer
144
views
Is there a foundational threat model for families/domestic users?
I am aware through hearsay of the threats exposed by certain digital assets. For example, not only should a password be kept secret, but it should not be re-used. Having the scenario unpacked for me, ...
1
vote
2
answers
529
views
Understanding risk analysis and threat modelling in practice
I am doing research in the security of cloud computing.
The purpose of the following questions is to understand the relationship between "risk analysis" and "threat modeling":
Do we usually analyze ...
29
votes
7
answers
5k
views
When do honest people need privacy or anonymity? (e.g. they have nothing to hide) [closed]
I'm having a discussion with someone who thinks they don't need technical measures of privacy or anonymity.
Common arguments against needing to care about privacy or anonymity include:
Everything ...
5
votes
3
answers
751
views
Is there any way of preventing (or punishing) abuse of anonymity networks? [closed]
Anonymity services/networks like Tor, VPNs that don't log etc., seem like very double edged swords. Is there any way to prevent people with bad intentions (like breaking the law) from using them or ...