shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

256
active users

#4d

0 posts0 participants0 posts today
꧁ᐊ𰻞ᵕ̣̣̣̣̣̣́́♛ᵕ̣̣̣̣̣̣́́𰻞ᐅ꧂<p><a href="https://mastodon.gamedev.place/tags/screenshotsaturday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>screenshotsaturday</span></a> here we can (barely) see ðe 🍭-mimic spider in its natural habitat,<br>While it may try to ambush &amp; kill you by default, it will appreciate you letting it eat a parasite from you or feeding it some candy larva(at least until it gets hungry again)</p><p><a href="https://mastodon.gamedev.place/tags/gamedev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gamedev</span></a> <a href="https://mastodon.gamedev.place/tags/worldbuilding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>worldbuilding</span></a> <a href="https://mastodon.gamedev.place/tags/4d" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4d</span></a> <a href="https://mastodon.gamedev.place/tags/roguelike" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>roguelike</span></a></p>
꧁ᐊ𰻞ᵕ̣̣̣̣̣̣́́♛ᵕ̣̣̣̣̣̣́́𰻞ᐅ꧂<p><a href="https://mastodon.gamedev.place/tags/screenshotsaturday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>screenshotsaturday</span></a> adding a speed system,<br>so moving in ziʒzags is faster(esp 3d &amp; 4d zigzegzogzags), coffee makes you faster, different weapons/tools have different speeds, &amp; obviously what ur moving θru also affects ur speed 2 𓅱</p><p><a href="https://mastodon.gamedev.place/tags/4d" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4d</span></a> <a href="https://mastodon.gamedev.place/tags/gamedev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gamedev</span></a> <a href="https://mastodon.gamedev.place/tags/MessageLost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MessageLost</span></a> <a href="https://mastodon.gamedev.place/tags/survival" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>survival</span></a> <a href="https://mastodon.gamedev.place/tags/roguelike" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>roguelike</span></a> <a href="https://mastodon.gamedev.place/tags/SponsoredByEuclid" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SponsoredByEuclid</span></a></p>
꧁ᐊ𰻞ᵕ̣̣̣̣̣̣́́♛ᵕ̣̣̣̣̣̣́́𰻞ᐅ꧂<p>Diagonal ✝️section of ðe 4d cartesian product of 2 "I want to be a sea urchin and eat cabbage"(yes, really) tilings</p><p>⬛🟦⬛<br>🟧⬜🟧 kinda like ðis<br>⬛🟦⬛</p><p>Unfortunately we are still too dimensionally, perceptually, &amp; probably intellectually challenged to even try to look at ðe full θing 😔</p><p><a href="https://mastodon.gamedev.place/tags/TilingTuesday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TilingTuesday</span></a> <a href="https://mastodon.gamedev.place/tags/tiling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tiling</span></a> <a href="https://mastodon.gamedev.place/tags/mathart" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mathart</span></a> <a href="https://mastodon.gamedev.place/tags/geometry" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>geometry</span></a> <a href="https://mastodon.gamedev.place/tags/mastoart" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mastoart</span></a> <a href="https://mastodon.gamedev.place/tags/4d" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4d</span></a> <a href="https://mastodon.gamedev.place/tags/abstract" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>abstract</span></a></p>
꧁ᐊ𰻞ᵕ̣̣̣̣̣̣́́♛ᵕ̣̣̣̣̣̣́́𰻞ᐅ꧂<p><a href="https://mastodon.gamedev.place/tags/Funfact" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Funfact</span></a> you can tile 4d space with ðe cartesian product of any 2 2d tilings(12.6.4 x 12.6.4 here),</p><p>Each resulting duoprism shape has a unique color(even if ðey can look like 2 difrnt polygons in ðese 2d🔄✝️sections)</p><p><a href="https://mastodon.gamedev.place/tags/TilingTuesday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TilingTuesday</span></a> <a href="https://mastodon.gamedev.place/tags/geometry" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>geometry</span></a> <a href="https://mastodon.gamedev.place/tags/creativecoding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>creativecoding</span></a> <a href="https://mastodon.gamedev.place/tags/mathart" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mathart</span></a> <a href="https://mastodon.gamedev.place/tags/tiling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tiling</span></a> <a href="https://mastodon.gamedev.place/tags/4d" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4d</span></a> <a href="https://mastodon.gamedev.place/tags/3d" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>3d</span></a></p>
tuxwise<p>(17/N) Finally, two threat types that refer to security more than privacy:</p><p><strong><a href="https://mastodon.de/tags/Obstructing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Obstructing</span></a></strong></p><p>An adversary destroys, withdraws, steals or misappropriates information, access, or resources. The obstruction can be temporary or permanent, partial or total. Obstructing can also occur unintentionally, with the “adversary” being deterioration, malfunction, or disaster.</p><p><strong><a href="https://mastodon.de/tags/Interfering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Interfering</span></a></strong></p><p>An adversary deliberately corrupts the integrity or authenticity of information, resources, processes, or interactions. The respective information, resources, processes, or interactions aren’t necessarily controlled or owned by the persons that are affected, and may also be fabricated. Interfering can also occur unintentionally, with the “adversary” being deterioration, malfunction, or disaster.</p><p>Start of this thread:<br><a href="https://mastodon.de/@tuxwise/113503228291818865" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113503228</span><span class="invisible">291818865</span></a></p><p><a href="https://mastodon.de/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatModeling</span></a> <a href="https://mastodon.de/tags/4D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4D</span></a></p>
tuxwise<p>(16/N) Three more threat types defined:</p><p><strong>Data <a href="https://mastodon.de/tags/disclosure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>disclosure</span></a></strong></p><p>An adversary makes somebody’s confidential data available to unauthorized parties.</p><p><strong>Manufacturing cooperation</strong></p><p>An adversary hides from somebody the potentially harmful consequences of their own decisions and actions, or denies them the option of avoiding such consequences, even when they are aware of them.</p><p><strong><a href="https://mastodon.de/tags/NonCompliance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NonCompliance</span></a></strong></p><p>Contrary to what somebody expects and trusts in, an adversary does not follow laws, documented policies or contractual obligations; or does not abide by what is perceived as conventions, or unwritten rules, in the respective context.</p><p>(to be continued)</p><p>Start of this thread:<br><a href="https://mastodon.de/@tuxwise/113503228291818865" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113503228</span><span class="invisible">291818865</span></a></p><p><a href="https://mastodon.de/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatModeling</span></a> <a href="https://mastodon.de/tags/4D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4D</span></a></p>
tuxwise<p>(15/N) Two more threat types defined:</p><p><strong>Undesirable non-repudiation or repudiation</strong></p><p><a href="https://mastodon.de/tags/Repudiation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Repudiation</span></a> (plausible denial) of what somebody has said / done / known / possessed becomes impossible because an adversary has managed to collect enough evidence to establish undesirable non-repudiation. In other words: the adversary can prove beyond reasonable doubt that "it" happened.</p><p>Alternatively, <a href="https://mastodon.de/tags/NonRepudiation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NonRepudiation</span></a> (proof beyond reasonable doubt) cannot be established because an adversary has managed to suppress or destroy enough evidence to gain the option of repudiation (plausible denial). In other words: the adversary can plausibly deny "it" happened.</p><p><strong>Detecting</strong></p><p>An adversary can check for the presence or absence of specific data items, which are tell-tale indicators for something else.</p><p>(to be continued)</p><p>Start of this thread:<br><a href="https://mastodon.de/@tuxwise/113503228291818865" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113503228</span><span class="invisible">291818865</span></a></p><p><a href="https://mastodon.de/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatModeling</span></a> <a href="https://mastodon.de/tags/4D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4D</span></a></p>
tuxwise<p>(14/N) Having familiarized ourselves with categories of adversaries, their main goals and their respective, overall "modus operandi", let's look at the types of threats posed by them.</p><p>Again, it pays to focus on <em>types</em> of threats: We don't want to become mainly alert-triggered, but proactive. There are several frameworks we can borrow ideas from, most notably the LINDDUN framework that is geared toward threats to privacy, and can be extended a bit to cover more ground.</p><p>First, our list of threat types:</p><ul><li><a href="https://mastodon.de/tags/Linking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linking</span></a> (spotting connections and relationships)</li><li><a href="https://mastodon.de/tags/Identifying" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Identifying</span></a> (mapping to identities)</li><li>Undesirable <a href="https://mastodon.de/tags/NonRepudiation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NonRepudiation</span></a> or <a href="https://mastodon.de/tags/repudiation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>repudiation</span></a></li><li><a href="https://mastodon.de/tags/Detecting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Detecting</span></a> (absence or presence of indicators)</li><li>Data <a href="https://mastodon.de/tags/disclosure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>disclosure</span></a> (to the unauthorized)</li><li>Manufacturing cooperation (disguised or imposed bad consequences)</li><li><a href="https://mastodon.de/tags/Obstructing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Obstructing</span></a> (access, information, resources)</li><li><a href="https://mastodon.de/tags/NonCompliance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NonCompliance</span></a></li><li><a href="https://mastodon.de/tags/Interfering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Interfering</span></a> (with information, resources, processes, interactions)</li></ul><p>Our definitions of these, for our context:</p><p><strong>Linking</strong></p><p>An adversary can figure out connections and relationships between formerly isolated items of interest.</p><p><strong>Identifiying</strong></p><p>An adversary can link items of interest directly to a natural person.</p><p>(to be continued)</p><p>Start of this thread:<br><a href="https://mastodon.de/@tuxwise/113503228291818865" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113503228</span><span class="invisible">291818865</span></a></p><p>LINDDUN:<br><a href="https://linddun.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">linddun.org/</span><span class="invisible"></span></a></p><p><a href="https://mastodon.de/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatModeling</span></a> <a href="https://mastodon.de/tags/4D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4D</span></a></p>
tuxwise<p>(13/N) The sixth, and last, category of adversaries:</p><p><strong>“They”</strong></p><p>“They” want to define boundaries and acceptable behavior for the masses, as well as monitor compliance on a large scale, and enforce it on an individual level.</p><p>As a consequence, permanent mass <a href="https://mastodon.de/tags/surveillance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>surveillance</span></a> of all types of assets is a means of monitoring the compliance of the majority, and of detecting deviant behavior. Legalizing more and more monitoring options becomes a goal, including international partnerships on information exchange. Depriving you of your assets, temporarily or permanently, is a means of enforcing your compliance or obedience. The mere threat of this can be sufficient to create a <a href="https://mastodon.de/tags/ChillingEffect" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ChillingEffect</span></a>.</p><p>State-sponsored actors (such as hacker groups) and nation-state threat actors (in the form of intelligence services, law enforcement, censorship offices, and other <a href="https://mastodon.de/tags/government" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>government</span></a> agencies) fall into this category. It also includes <a href="https://mastodon.de/tags/companies" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>companies</span></a> that have either a monopoly, or a significant share of an oligopolistic market, or portfolio of services specifically targeted at the public sector.</p><p>While the entities in this category may seem wildly heterogeneous at first, remember that there are <a href="https://mastodon.de/tags/RevolvingDoors" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RevolvingDoors</span></a> between them, for swapping their respective “ex” members. Beyond lobbying, there is also a complex, ongoing collaboration between many of them, which has been described as “grey intelligence”, “grey policing”, “public-private partnership”, etc.</p><p>Start of this thread:<br><a href="https://mastodon.de/@tuxwise/113503228291818865" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113503228</span><span class="invisible">291818865</span></a></p><p><a href="https://mastodon.de/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatModeling</span></a> <a href="https://mastodon.de/tags/4D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4D</span></a></p>
tuxwise<p>(12/N) A fifth category of adversaries:</p><p><strong>🦕 Business(i)es</strong></p><p><a href="https://mastodon.de/tags/Business" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Business</span></a>​(i)es want to extract <a href="https://mastodon.de/tags/profit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>profit</span></a> from you. Preferably, but not necessarily in legal, sustainable, and the cheapest possible ways.</p><p>Your assets are seen as levers to generate more profit, because they betray what is meaningful to you, and worth investing into, in your eyes.</p><p>Businessies disguise their factual indifference towards your specific assets by enthusiastically pretending to "care" as much for them as you do, to achieve the "Nessie effect": on the surface, always appear likeable, despite your size, and in spite of what you are actually pursuing under the surface.</p><p>This category is the widest of all. Nearly all businessies participate in <a href="https://mastodon.de/tags/SurveillanceCapitalism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SurveillanceCapitalism</span></a>, either by directly aggregating every tidbit of your data in a <a href="https://mastodon.de/tags/profile" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>profile</span></a>, in return for a service that is allegedly "free" – and later selling targeted access to you; or by paying <a href="https://mastodon.de/tags/DataBrokers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataBrokers</span></a> for access to potential customers that fit very specific criteria.</p><p>(to be continued)</p><p>Start of this thread:<br><a href="https://mastodon.de/@tuxwise/113503228291818865" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113503228</span><span class="invisible">291818865</span></a></p><p><a href="https://mastodon.de/tags/ThreadModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreadModeling</span></a> <a href="https://mastodon.de/tags/4D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4D</span></a></p>
tuxwise<p>(11/N) A fourth category of adversaries:</p><p><strong>🫳 Intruders</strong></p><p><a href="https://mastodon.de/tags/Intruders" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intruders</span></a> want to ignore your <a href="https://mastodon.de/tags/boundaries" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>boundaries</span></a> at will, and their related actions to be unrestricted and without repercussions, for as long as possible. Additionally, satisfaction might be derived from any ineffective responses to their actions.</p><p>Controlling your assets at will, and having unrestricted access to them is their goal. Some are fantasizing about a relationship with you that would somehow entitle them to it. Sometimes, their actions include damaging, or destruction of, your assets, to inflict suffering upon you, or for revenge, or to gain notoriety.</p><p>This is a wide category that includes attention-getters; <a href="https://mastodon.de/tags/narcissists" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>narcissists</span></a> and <a href="https://mastodon.de/tags/stalkers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>stalkers</span></a>; abusive, vengeful and jealous people; starstruck individuals seeking <a href="https://mastodon.de/tags/parasocial" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>parasocial</span></a> interaction; thrill seekers; script kiddies; "OSINT" wannabees; swatters; vandals; and sometimes even potential employers.</p><p>(to be continued)</p><p>Start of this thread:<br><a href="https://mastodon.de/@tuxwise/113503228291818865" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113503228</span><span class="invisible">291818865</span></a></p><p><a href="https://mastodon.de/tags/ThreadModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreadModeling</span></a> <a href="https://mastodon.de/tags/4D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4D</span></a></p>
tuxwise<p>(10/N) A third category of adversaries:</p><p><strong>☝️ Ideologues</strong></p><p><a href="https://mastodon.de/tags/Ideologues" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ideologues</span></a> want to push you to do the right thing, or to punish you for doing the wrong thing. They may also want to eliminate you, physically or metaphorically, when they can't achieve their goal: Maybe you just won't learn, or are incorrigible, as such.</p><p>The assets that you are "entitled" to are considered a reward, for conforming to the respective ideology. The portion of your assets that you aren't "entitled" to is usually the target of relentless denial, even destruction.</p><p>Entitlement is always conditional, and temporary: In case you seem to be going astray, and appeals to your conscience do not seem to have enough effect, your assets may be withdrawn or destroyed.</p><p>Hacktivists, campaigners, protagonists or minions of gender-based violence, lobbyists, racists, and terrorists fall into this category.</p><p>Note: I am not judging how "just" the respective "causes" are, I'm talking about behaviors.</p><p>(to be continued)</p><p>Start of this thread:<br><a href="https://mastodon.de/@tuxwise/113503228291818865" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113503228</span><span class="invisible">291818865</span></a></p><p><a href="https://mastodon.de/tags/ThreadModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreadModeling</span></a> <a href="https://mastodon.de/tags/4D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4D</span></a></p>
tuxwise<p>(9/N) A second category of adversaries:</p><p><strong>💰 Criminals</strong></p><p>Criminals want valuable resources that you happen to possess, at the moment.</p><p>From that point of view, seemingly valuable assets are to be pried from your hands, while your “junk” assets may be ignored, at best. At worst, they’ll be carelessly destroyed in the process, or the threat of their destruction will be weaponized against you.</p><p>Typical activities of criminals are scams, ransomware attacks, or identity theft. There's a dedicated "eCrime ecosystem" with crime infrastructure providers; marketplaces for stolen, private information; illegal access brokers selling credentials; and even “big game hunters” executing targeted attacks on large corporations, as a paid service.</p><p>BTW, calling these adversaries "cybercriminals" instead is just a dumb court curtsy.</p><p>(to be continued)</p><p>Start of this thread:<br><a href="https://mastodon.de/@tuxwise/113503228291818865" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113503228</span><span class="invisible">291818865</span></a></p><p><a href="https://mastodon.de/tags/ThreadModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreadModeling</span></a> <a href="https://mastodon.de/tags/4D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4D</span></a></p>
tuxwise<p>(8/N) For now, leave your spreadsheet of assets alone and turn to the second question of the <a href="https://mastodon.de/tags/ThreatModelingManifesto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatModelingManifesto</span></a>:</p><p><strong>2. What can go wrong?</strong></p><p>The answer usually includes a list of adversaries, so you can later consider which ones you stand a chance fighting, if you think it's worth it.</p><p>Again, this may be helpful for corporations, but not that much for individuals, since damage done to individuals can be much deeper, and last for much longer, even for life.</p><p>So, lets rather consider abstract categories of adversaries from a perspective of what their primary goals are, and what they usually do to achieve them. We don't bother with specific bad actors here, nor are we considering how to "help them" via psychotherapy, legislation, imprisonment or campaigning, at this point in time.</p><p>First, the list:</p><ul><li>🤷 You, and people like you</li><li>💰 <a href="https://mastodon.de/tags/Criminals" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Criminals</span></a></li><li>☝️ <a href="https://mastodon.de/tags/Ideologues" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ideologues</span></a></li><li>🫳 <a href="https://mastodon.de/tags/Intruders" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Intruders</span></a></li><li>🦕 <a href="https://mastodon.de/tags/Business" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Business</span></a>(i)es</li><li>🏢 “<a href="https://mastodon.de/tags/They" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>They</span></a>”</li></ul><p>A few thoughts, on each category:</p><p><strong>🤷 You, and people like you</strong></p><p>You and others prefer to keep asset protection efforts to a minimum. You tend to take the integrity of your assets for granted, hoping that others will respect your boundaries, either out of respect for you or because of legal regulations and repercussions. Your attitude towards handling the assets of others is equally shortsighted and careless.</p><p>As a result, your digital assets stay exposed, and you're putting others at risk, too.</p><p>(to be continued)</p><p>Start of this thread:<br><a href="https://mastodon.de/@tuxwise/113503228291818865" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113503228</span><span class="invisible">291818865</span></a></p><p><a href="https://mastodon.de/tags/ThreadModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreadModeling</span></a> <a href="https://mastodon.de/tags/4D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4D</span></a></p>
tuxwise<p>(7/N) You should now have a spreadsheet filled with a list of all of your data and device "assets" (that you were able to remember, so far).</p><p>BTW, that spreadsheet is stored on encrypted media only, isn't it?</p><p>Now, for each asset, verify again that you have set all appropriate category checkmarks in the columns described under (4/N):</p><p><a href="https://mastodon.de/@tuxwise/113521613245140566" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113521613</span><span class="invisible">245140566</span></a></p><p>Then, considering not just quantifiable damage like a potential loss of money, but also the abstracts assets listed under (3/N) …</p><p><a href="https://mastodon.de/@tuxwise/113514249877671549" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113514249</span><span class="invisible">877671549</span></a></p><p>… reflect a little, per specific asset, how bad the consequences would be if it were disclosed, destroyed, or deanonymized. If you wish, track the consequences in an additional column, possibly using a qualitative range like: 🤷 … 😟 … 😳 … 😭 … 😱</p><p>Unlike with traditional, or "corporate" threat modeling, I find it less helpful to try and merely quantify such an assessment of potential damages, and to separate it from recording the assets. I also find it not helpful to consider various types of bad actors already, at this stage.</p><p>Since everything in our asset list relates to us, individually and personally, measurable damage like a potential loss of money is only a part of the impact.</p><p>As humans, we can't just (more or less) gracefully disappear [*], like a business, or an organization. We also don't get much relief from claiming we've been as diligent as mandated by regulations or policies, since we won't be merely held "accountable" for damages, but will actually suffer from them, physically and psychologically, possibly for life.</p><p>Start of this thread:<br><a href="https://mastodon.de/@tuxwise/113503228291818865" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113503228</span><span class="invisible">291818865</span></a></p><p><a href="https://mastodon.de/tags/ThreadModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreadModeling</span></a> <a href="https://mastodon.de/tags/4D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4D</span></a> </p><p>[*] No, not even in countries with moderate tracking of the whereabouts and names of their citizens.</p>
tuxwise<p>(6/N) A final set of prompts, for three more categories. Add the related data "assets" that come to your mind to your spreadsheet:</p><p><strong>🛰️ <a href="https://mastodon.de/tags/Geospatial" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Geospatial</span></a> data</strong></p><p>🗺️ Current <a href="https://mastodon.de/tags/position" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>position</span></a><br>🏠 Place of residence<br>🛰️ GNSS-precision tracks<br>🗓️ Appointment <a href="https://mastodon.de/tags/calendars" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>calendars</span></a><br>🎫 <a href="https://mastodon.de/tags/Ticket" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ticket</span></a> purchases<br>🏨 Room <a href="https://mastodon.de/tags/reservations" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reservations</span></a><br>…</p><p><strong>🛜 <a href="https://mastodon.de/tags/Infrastructure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infrastructure</span></a></strong></p><p>🌐 <a href="https://mastodon.de/tags/Internet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Internet</span></a> access<br>🛜 <a href="https://mastodon.de/tags/Router" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Router</span></a><br>🟰 Network neutrality<br>💻 Hardware<br>🧑‍💻 Software<br>🪙 Means of <a href="https://mastodon.de/tags/payment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>payment</span></a><br>…</p><p><strong>🫥 <a href="https://mastodon.de/tags/Accounts" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Accounts</span></a> and <a href="https://mastodon.de/tags/handles" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>handles</span></a></strong></p><p>📧 Email &amp; Messaging (including content)<br>⭐ Social media<br>☁️ Cloud<br>🫥 Pseudonyms &amp; personas<br>…</p><p>Remember many data "assets" will fall into multiple categories. For every asset, leave a checkmark in all applicable category columns.</p><p>Start of this thread:<br><a href="https://mastodon.de/@tuxwise/113503228291818865" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113503228</span><span class="invisible">291818865</span></a></p><p><a href="https://mastodon.de/tags/ThreadModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreadModeling</span></a> <a href="https://mastodon.de/tags/4D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4D</span></a></p>
geekgirl :mastodon:<p>I had such a bad experience with <a href="https://bne.social/tags/4D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4D</span></a> previously, I swore I'd never do it again. However, there are some reports saying that the <a href="https://bne.social/tags/film" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>film</span></a> <a href="https://bne.social/tags/Wicked" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wicked</span></a> in 4D is a somewhat smooth ride. If, anyone has been &amp; experienced this film in 4D, do let me know. I'm not a lover of musicals, per se, but I can see that a lot of the imagery is quite beautiful. <a href="https://bne.social/tags/Opinions" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Opinions</span></a> please 🙏 Maybe just a good old fashioned VMax will suffice!</p>
tuxwise<p>(5/N) A few more prompts, for two categories. Add the related data "assets" that come to your mind to your spreadsheet:</p><p><strong>📇 Social graphs – which of your data betrays them?</strong></p><p>📇 Contacts<br>🫂 Follows &amp; follower<br>👍 Interactions (like, repost etc.)<br>💬 Chats &amp; communication metadata<br>🎼 Workflows &amp; handovers<br>👑 Workplace hierarchies<br>…</p><p><strong>🗃️ Data and metadata – "Files"</strong></p><p>🗃️ Your documents &amp; databases<br>🎞️ Multimedia, photos, videos<br>📝 Journals &amp; notes<br>💳 Invoices, receipts, billing statements, transaction records<br>👣 Server logs, call lists<br>…</p><p>Start of this thread:<br><a href="https://mastodon.de/@tuxwise/113503228291818865" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113503228</span><span class="invisible">291818865</span></a></p><p><a href="https://mastodon.de/tags/ThreadModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreadModeling</span></a> <a href="https://mastodon.de/tags/4D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4D</span></a></p>
tuxwise<p>(4/N) Having reflected a bit on your abstract assets, try to brainstorm as many of your related data and device assets as possible. Most of them will fall into one or more of the following categories:</p><p>🪪 Personally Identifiable Information (<a href="https://mastodon.de/tags/PII" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PII</span></a>)<br>📇 Social graphs<br>🗃️ Data and metadata<br>🛰️ <a href="https://mastodon.de/tags/Geospatial" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Geospatial</span></a> data<br>🛜 Infrastructure<br>🫥 <a href="https://mastodon.de/tags/Accounts" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Accounts</span></a> and <a href="https://mastodon.de/tags/handles" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>handles</span></a></p><p>For instance, your smartphone photo collection "asset" probably contains geospatial data (<a href="https://mastodon.de/tags/GPS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GPS</span></a> coordinates in <a href="https://mastodon.de/tags/EXIF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EXIF</span></a>); data and metadata (phone brand and model, in EXIF); potentially also information about your social graph, in case your family, friends or acquaintances are on your photos.</p><p>It's probably best to track your data and device assets in a spreadsheet, with the above categories as additional columns, so you can place a checkmark, where appropriate. I'd also suggest to add a column to track where the data is stored / the device is located.</p><p>Here's a little list of 🪪 Personally Identifiable Information (PII), to get you started (other categories in next posts):</p><p>🪪 Any kind of identity document<br>🎂 Dates of significant life events<br>👆 <a href="https://mastodon.de/tags/Biometric" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Biometric</span></a> data<br>⚕️ <a href="https://mastodon.de/tags/Health" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Health</span></a> data<br>🧬 <a href="https://mastodon.de/tags/DNA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNA</span></a> test results<br>👪 <a href="https://mastodon.de/tags/Genealogy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Genealogy</span></a> data<br>…</p><p>Start of this thread:<br><a href="https://mastodon.de/@tuxwise/113503228291818865" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113503228</span><span class="invisible">291818865</span></a></p><p><a href="https://mastodon.de/tags/ThreadModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreadModeling</span></a> <a href="https://mastodon.de/tags/4D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4D</span></a></p>
tuxwise<p>(3/N) The first (adapted) question of the <a href="https://mastodon.de/tags/ThreadModelingManifesto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreadModelingManifesto</span></a> is:</p><ol><li>What are you working on?</li></ol><p>The answer in a business context is usually a set of "<a href="https://mastodon.de/tags/assets" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>assets</span></a>" that are worth protecting.</p><p>Individuals seem to struggle more than businesses with brainstorming specific and relevant "assets", though. The mental link to potential threats seems to be hard to make. That's why I suggest to reflect on a few abstract assets, first – how much do these matter to you, relatively?</p><p>🛌 <a href="https://mastodon.de/tags/Safety" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Safety</span></a> and <a href="https://mastodon.de/tags/wellbeing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wellbeing</span></a></p><p>Your freedom. Having a home. Your physical and mental integrity. Your autonomy. Having a space of your own, with your boundaries being respected. Creative space and time, free from interference. Being able to own things; or in some cultures, to participate in shared stewardship, and benefit from commons. Integrity of objects and data that belong to you, or that you depend on.</p><p>🗺️ Your <a href="https://mastodon.de/tags/locations" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>locations</span></a> and <a href="https://mastodon.de/tags/movements" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>movements</span></a></p><p>Where exactly your domicile is. Your travel plans. The freedom to move and to gather, without surveillance or tracking. The right to solitude.</p><p>👤 Your <a href="https://mastodon.de/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a>, and your <a href="https://mastodon.de/tags/anonymity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>anonymity</span></a></p><p>Being able to stay incognito, or pseudonymous. Deciding who gets to know what about you. The option of repudiating claims about what you allegedly believe, have said, or have done – regardless of the facts.</p><p>🔗 Your <a href="https://mastodon.de/tags/relationships" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>relationships</span></a> </p><p>Knowledge about your family, friends and significant others. Your reputation and public standing. The freedom to associate with others. Knowledge about your memberships, the communities you belong to, and your employment, including the specific hierarchies within those contexts.</p><p>💭 Your <a href="https://mastodon.de/tags/personality" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>personality</span></a></p><p>Your identity and its facets, including gender. Political affiliations, and religious beliefs. Your hobbies, love interests, feelings, intentions, behaviors, habits, and preferences.</p><p>🔓 <a href="https://mastodon.de/tags/Access" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Access</span></a> and <a href="https://mastodon.de/tags/infrastructure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infrastructure</span></a></p><p>Access to information, goods, and services. Availability of a functional infrastructure that enables such access.</p><p><a href="https://www.threatmodelingmanifesto.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">threatmodelingmanifesto.org/</span><span class="invisible"></span></a></p><p>Start of this thread:<br><a href="https://mastodon.de/@tuxwise/113503228291818865" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113503228</span><span class="invisible">291818865</span></a></p><p><a href="https://mastodon.de/tags/ThreadModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreadModeling</span></a> <a href="https://mastodon.de/tags/4D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4D</span></a></p>