shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

245
active users

#threatmodeling

0 posts0 participants0 posts today
Paco Hope #resist<p>I just saw <a href="https://docs.diniscruz.ai/2025/05/29/advancing-threat-modeling-with-semantic-knowledge-graphs.html" rel="nofollow noopener noreferrer" target="_blank">this paper by Dinis Cruz</a> on <a href="https://infosec.exchange/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatModeling</span></a> with <a href="https://infosec.exchange/tags/LLMs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LLMs</span></a>. I've been thinking along these lines for a while, but he's written it down completely and cogently. I agree with a lot of what I have read so far (Haven't finished it yet)</p><p>Edit: <span class="h-card" translate="no"><a href="https://fediscience.org/@WiseWoman" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>WiseWoman</span></a></span> called my attention to the fact that Dinis lists "ChatGPT Deep Research" as a co-author(?). Sigh. No wonder this text passed the sniff test. It's so full of chatbot output he gave the chatbot co-author credit.</p><p>Ah well. Some of it is right. But now the inconsistencies make sense.</p><p><a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>appsec</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p>
Adam Shostack :donor: :rebelverified:<p>Nice list of things to listen for from <span class="h-card" translate="no"><a href="https://infosec.exchange/@kaoudis" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>kaoudis</span></a></span> <a href="https://infosec.exchange/tags/threatmodeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatmodeling</span></a> but more broad. <a href="https://infosec.exchange/tags/tmcon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tmcon</span></a></p>
OWASP Foundation<p>🔐 Get Ready for OWASP Global AppSec USA 2025! 🔐</p><p>This event is built for everyone in the CyberSec community, whether you want to expand your skills or discover new solutions, this is the event for you.</p><p>🎟️ Register now: <a href="https://owasp.glueup.com/event/131624/register/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">owasp.glueup.com/event/131624/</span><span class="invisible">register/</span></a></p><p><a href="https://infosec.exchange/tags/OWASP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OWASP</span></a> <a href="https://infosec.exchange/tags/AppSecUSA2025" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AppSecUSA2025</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/ApplicationSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ApplicationSecurity</span></a> <a href="https://infosec.exchange/tags/DevSecOps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DevSecOps</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://infosec.exchange/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatModeling</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/WashingtonDCEvents" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WashingtonDCEvents</span></a> <a href="https://infosec.exchange/tags/SecureByDesign" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecureByDesign</span></a></p>
BSides Boulder<p>⚡ Attackers are more regularly targeting industrial control systems (ICS) on Operational Technology (OT), which have led to devistating real world consequences 😵 </p><p>Trace attack paths in ICS with Gilberto "Gil" Garcia's <a href="https://infosec.exchange/tags/BSidesBoulder25" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BSidesBoulder25</span></a> talk "Attack Path Modeling for Securing ICS/OT Systems"! Attendees will learn how to visualize adversary movements, focus on crown jewels, and turn free tools and threat intel into actionable defense strategies through understanding attacker workflows. <br>Garcia's session will also delve into frameworks, modeling techniques, and the integration of intelligence-driven security measures to strengthen ICS/OT resilience - because in critical infrastructure, guesswork isn’t a good option! 🛠️🔌 <a href="https://infosec.exchange/tags/BSides" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BSides</span></a> <a href="https://infosec.exchange/tags/BSidesBoulder" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BSidesBoulder</span></a> <a href="https://infosec.exchange/tags/ICS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ICS</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/OTSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OTSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatModeling</span></a></p><p>Tickets are available for purchase for our 13 June event here: <a href="https://www.eventbrite.com/e/bsides-boulder-2025-registration-1290129274389" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">eventbrite.com/e/bsides-boulde</span><span class="invisible">r-2025-registration-1290129274389</span></a></p>
Paco Hope #resist<p>I have seen a lot of efforts to use an <a href="https://infosec.exchange/tags/LLM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LLM</span></a> to create a <a href="https://infosec.exchange/tags/ThreatModel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatModel</span></a>. I have some insights. </p><p>Attempts at <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatModeling</span></a> tend to do 3 things wrong:</p><ol><li>They assume that the user's input is both complete and correct. The LLM (in the implementations I've seen) never questions "are you sure?" and it never prompts the user like "you haven't told me X, what about X?"</li><li>Lots of teams treat a threat model as a deliverable. Like we go build our code, get ready to ship, and then "oh, shit! Security wants a threat model. Quick, go make one." So it's not this thing that informs any development choices <em>during development</em>. It's an afterthought that gets built just prior to <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AppSec</span></a> review.</li><li>Lots of people think you can do an adequate threat model with only technical artifacts (code, architectuer, data flow, documentation, etc.). There's business context that needs to be part of every decision, and teams are just ignoring that.</li></ol><p>1/n</p>
Adam Shostack :donor: :rebelverified:<p>My <a href="https://infosec.exchange/tags/Appsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Appsec</span></a> roundup for April is live. No blow by blow masto post this time because i have to head to the airport soon for <a href="https://infosec.exchange/tags/rsac" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rsac</span></a> </p><p>Lots of <a href="https://infosec.exchange/tags/threatmodeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatmodeling</span></a>, important improvements to <a href="https://infosec.exchange/tags/llm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>llm</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> and more</p><p><a href="https://shostack.org/blog/appsec-roundup-april/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">shostack.org/blog/appsec-round</span><span class="invisible">up-april/</span></a></p>
GeneralX ⏯️<p>"The Signals Network (TSN) and the Reynolds Journalism Institute (RJI) are launching comprehensive training for journalists working with sensitive sources.</p><p>The training modules will live permanently on TSN’s website and be free to access."</p><p><a href="https://rjionline.org/news/protecting-the-protectors/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">rjionline.org/news/protecting-</span><span class="invisible">the-protectors/</span></a><br><a href="https://freeradical.zone/tags/journalism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>journalism</span></a> <a href="https://freeradical.zone/tags/whistleblowers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>whistleblowers</span></a> <a href="https://freeradical.zone/tags/digitalsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>digitalsecurity</span></a> <a href="https://freeradical.zone/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://freeradical.zone/tags/threatmodeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatmodeling</span></a></p>
Gary McGraw<p>Making automated Threat Modeling better with applied ML. A recorded webinar that I participate in yesterday.<br><a href="https://sigmoid.social/tags/MLsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MLsec</span></a> <a href="https://sigmoid.social/tags/ML" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ML</span></a> <a href="https://sigmoid.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://sigmoid.social/tags/swsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>swsec</span></a> <a href="https://sigmoid.social/tags/appsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>appsec</span></a> <a href="https://sigmoid.social/tags/threatmodeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatmodeling</span></a> </p><p><a href="https://www.youtube.com/playlist?list=PLpo8W6wt_WV-haEOL-nWyz5TKhJOJ5Gao" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/playlist?list=PLpo</span><span class="invisible">8W6wt_WV-haEOL-nWyz5TKhJOJ5Gao</span></a></p>
9x0rg<p>Hi <span class="h-card" translate="no"><a href="https://mastodon.social/@elizayer" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>elizayer</span></a></span>,</p><p>Here's a good write-up about <a href="https://mamot.fr/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatModeling</span></a> by <span class="h-card" translate="no"><a href="https://mastodon.neat.computer/@privacyguides" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>privacyguides</span></a></span>: </p><p><a href="https://www.privacyguides.org/en/basics/threat-modeling/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">privacyguides.org/en/basics/th</span><span class="invisible">reat-modeling/</span></a></p><p>Also, these are the VPN they recommended - and why:</p><p>**VPN Services**<br><a href="https://www.privacyguides.org/en/vpn/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">privacyguides.org/en/vpn/</span><span class="invisible"></span></a></p><p>[Spoiler: NordVPN is **not** on the list, for good reasons]</p><p>Hope this helps.<br> <span class="h-card" translate="no"><a href="https://mastodon.publicinterest.town/@krusynth" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>krusynth</span></a></span></p>
Kelly Shortridge<p>so many <a href="https://hachyderm.io/tags/threat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threat</span></a> modeling workflows are uncivilized, creaky, positively antediluvian. </p><p><a href="https://hachyderm.io/tags/threatmodeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatmodeling</span></a> should be modern, configured as code, a creative, collaborative romp to reify a defensive strategy that outmaneuvers attackers.</p><p>thus, this yule, my deciduous.app co-conspirator <span class="h-card" translate="no"><a href="https://hachyderm.io/@rpetrich" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>rpetrich</span></a></span> and I bear a gift: Deciduous-VS, a <a href="https://hachyderm.io/tags/VSCode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VSCode</span></a> extension to build and visualize decision trees within your IDE 🎄 (== local dev for classified/regulated envs, too)</p><p>learn more in my post: <a href="https://kellyshortridge.com/blog/posts/deciduous-for-vscode-local-decision-tree-editing/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">kellyshortridge.com/blog/posts</span><span class="invisible">/deciduous-for-vscode-local-decision-tree-editing/</span></a></p>
tuxwise<p>(19/N) Let's now turn to the third question of the <a href="https://mastodon.de/tags/ThreatModelingManifesto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatModelingManifesto</span></a>: </p><p><strong>3. What are you going to do about it?</strong></p><p>It pays to first establish a few contraints for what you can do, in theory, by <a href="https://mastodon.de/tags/classifying" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>classifying</span></a> your <a href="https://mastodon.de/tags/assets" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>assets</span></a>. Again, for an individual human being, opposed to organizations or companies, it's nearly impossible to impose principles like <a href="https://mastodon.de/tags/ZeroTrust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroTrust</span></a> or <a href="https://mastodon.de/tags/NeedToKnow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NeedToKnow</span></a> on personal relationships, the closer they get.</p><p>So, avoid recycling terms from popular, but less intuitive schemes: Fanciful intelligence labels like “top secret”, “confidential”, or “unclassified” do not tell you what goes into the respective box, and how to handle access to it.</p><p>Add another column to your assets spreadsheet, label it "Classification", and pick a more human-centered approach for its values, like:</p><ul><li>For Your Eyes Only (FYEO)</li><li>Intimate</li><li>None Of Your Business (NOYB)</li><li>Shared</li><li>Public</li></ul><p>Let's briefly go through these suggestions:</p><p><strong>For Your Eyes Only (FYEO)</strong></p><p>Assets that are only accessible to, and controlled by nobody but you, because they need to be resilient, even in the face of the closest of your close people misbehaving. Preferably, these assets are kept publicly undetectable and unknown. When <em>you</em> are gone, these assets will be gone, too. FYEO does not make a good default class, though.</p><p>Start of this thread:<br><a href="https://mastodon.de/@tuxwise/113503228291818865" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113503228</span><span class="invisible">291818865</span></a></p><p><a href="https://mastodon.de/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatModeling</span></a> <a href="https://mastodon.de/tags/4D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4D</span></a></p>
tuxwise<p>(18/N) Revisit your spreadsheet of assets now, specifically the "Consequences" column we had added in (7/N).</p><ul><li>Expanding the simplified approach to threats from "disclosed, destroyed, deanonymized" to the full set of threat types; and</li><li>Taking into account all categories of adversaries:</li></ul><p><strong>How does your assessment of potential consequences change?</strong> Walk through your list of assets, and change the values in the "Consequences" column where needed.</p><p><strong>Categories of adversaries:</strong></p><ul><li>You, and people like you</li><li>Criminals</li><li>Ideologues</li><li>Intruders</li><li>Business(i)es</li><li>“They”</li></ul><p><strong>Threat types:</strong></p><ul><li>Linking</li><li>Identifiying</li><li>Undesirable non-repudiation or repudiation</li><li>Detecting</li><li>Data disclosure</li><li>Manufacturing cooperation</li><li>Non-compliance</li><li>Obstructing</li><li>Interfering</li></ul><p><strong>Consequences</strong></p><p>… when threats by adversaries become reality (feel free to change and rename):</p><ul><li>🤷 So what?</li><li>😟 Oh…</li><li>😳 Ouch.</li><li>😭 Hurts badly.</li><li>😱 Life-changing disaster.</li></ul><p>Consequences (7/N):<br><a href="https://mastodon.de/@tuxwise/113548439494399874" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113548439</span><span class="invisible">494399874</span></a></p><p>Categories of adversaries (8/N):<br><a href="https://mastodon.de/@tuxwise/113560309025649046" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113560309</span><span class="invisible">025649046</span></a></p><p>Types of threats (14/N):<br><a href="https://mastodon.de/@tuxwise/113622961370958693" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113622961</span><span class="invisible">370958693</span></a></p><p>Start of this thread:<br><a href="https://mastodon.de/@tuxwise/113503228291818865" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113503228</span><span class="invisible">291818865</span></a></p><p><a href="https://mastodon.de/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatModeling</span></a> <a href="https://mastodon.de/tags/4D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4D</span></a></p>
tuxwise<p>(17/N) Finally, two threat types that refer to security more than privacy:</p><p><strong><a href="https://mastodon.de/tags/Obstructing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Obstructing</span></a></strong></p><p>An adversary destroys, withdraws, steals or misappropriates information, access, or resources. The obstruction can be temporary or permanent, partial or total. Obstructing can also occur unintentionally, with the “adversary” being deterioration, malfunction, or disaster.</p><p><strong><a href="https://mastodon.de/tags/Interfering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Interfering</span></a></strong></p><p>An adversary deliberately corrupts the integrity or authenticity of information, resources, processes, or interactions. The respective information, resources, processes, or interactions aren’t necessarily controlled or owned by the persons that are affected, and may also be fabricated. Interfering can also occur unintentionally, with the “adversary” being deterioration, malfunction, or disaster.</p><p>Start of this thread:<br><a href="https://mastodon.de/@tuxwise/113503228291818865" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113503228</span><span class="invisible">291818865</span></a></p><p><a href="https://mastodon.de/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatModeling</span></a> <a href="https://mastodon.de/tags/4D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4D</span></a></p>
tuxwise<p>(16/N) Three more threat types defined:</p><p><strong>Data <a href="https://mastodon.de/tags/disclosure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>disclosure</span></a></strong></p><p>An adversary makes somebody’s confidential data available to unauthorized parties.</p><p><strong>Manufacturing cooperation</strong></p><p>An adversary hides from somebody the potentially harmful consequences of their own decisions and actions, or denies them the option of avoiding such consequences, even when they are aware of them.</p><p><strong><a href="https://mastodon.de/tags/NonCompliance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NonCompliance</span></a></strong></p><p>Contrary to what somebody expects and trusts in, an adversary does not follow laws, documented policies or contractual obligations; or does not abide by what is perceived as conventions, or unwritten rules, in the respective context.</p><p>(to be continued)</p><p>Start of this thread:<br><a href="https://mastodon.de/@tuxwise/113503228291818865" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113503228</span><span class="invisible">291818865</span></a></p><p><a href="https://mastodon.de/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatModeling</span></a> <a href="https://mastodon.de/tags/4D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4D</span></a></p>
tuxwise<p>(15/N) Two more threat types defined:</p><p><strong>Undesirable non-repudiation or repudiation</strong></p><p><a href="https://mastodon.de/tags/Repudiation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Repudiation</span></a> (plausible denial) of what somebody has said / done / known / possessed becomes impossible because an adversary has managed to collect enough evidence to establish undesirable non-repudiation. In other words: the adversary can prove beyond reasonable doubt that "it" happened.</p><p>Alternatively, <a href="https://mastodon.de/tags/NonRepudiation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NonRepudiation</span></a> (proof beyond reasonable doubt) cannot be established because an adversary has managed to suppress or destroy enough evidence to gain the option of repudiation (plausible denial). In other words: the adversary can plausibly deny "it" happened.</p><p><strong>Detecting</strong></p><p>An adversary can check for the presence or absence of specific data items, which are tell-tale indicators for something else.</p><p>(to be continued)</p><p>Start of this thread:<br><a href="https://mastodon.de/@tuxwise/113503228291818865" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113503228</span><span class="invisible">291818865</span></a></p><p><a href="https://mastodon.de/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatModeling</span></a> <a href="https://mastodon.de/tags/4D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4D</span></a></p>
tuxwise<p>(14/N) Having familiarized ourselves with categories of adversaries, their main goals and their respective, overall "modus operandi", let's look at the types of threats posed by them.</p><p>Again, it pays to focus on <em>types</em> of threats: We don't want to become mainly alert-triggered, but proactive. There are several frameworks we can borrow ideas from, most notably the LINDDUN framework that is geared toward threats to privacy, and can be extended a bit to cover more ground.</p><p>First, our list of threat types:</p><ul><li><a href="https://mastodon.de/tags/Linking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linking</span></a> (spotting connections and relationships)</li><li><a href="https://mastodon.de/tags/Identifying" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Identifying</span></a> (mapping to identities)</li><li>Undesirable <a href="https://mastodon.de/tags/NonRepudiation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NonRepudiation</span></a> or <a href="https://mastodon.de/tags/repudiation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>repudiation</span></a></li><li><a href="https://mastodon.de/tags/Detecting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Detecting</span></a> (absence or presence of indicators)</li><li>Data <a href="https://mastodon.de/tags/disclosure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>disclosure</span></a> (to the unauthorized)</li><li>Manufacturing cooperation (disguised or imposed bad consequences)</li><li><a href="https://mastodon.de/tags/Obstructing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Obstructing</span></a> (access, information, resources)</li><li><a href="https://mastodon.de/tags/NonCompliance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NonCompliance</span></a></li><li><a href="https://mastodon.de/tags/Interfering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Interfering</span></a> (with information, resources, processes, interactions)</li></ul><p>Our definitions of these, for our context:</p><p><strong>Linking</strong></p><p>An adversary can figure out connections and relationships between formerly isolated items of interest.</p><p><strong>Identifiying</strong></p><p>An adversary can link items of interest directly to a natural person.</p><p>(to be continued)</p><p>Start of this thread:<br><a href="https://mastodon.de/@tuxwise/113503228291818865" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113503228</span><span class="invisible">291818865</span></a></p><p>LINDDUN:<br><a href="https://linddun.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">linddun.org/</span><span class="invisible"></span></a></p><p><a href="https://mastodon.de/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatModeling</span></a> <a href="https://mastodon.de/tags/4D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4D</span></a></p>
tuxwise<p>(13/N) The sixth, and last, category of adversaries:</p><p><strong>“They”</strong></p><p>“They” want to define boundaries and acceptable behavior for the masses, as well as monitor compliance on a large scale, and enforce it on an individual level.</p><p>As a consequence, permanent mass <a href="https://mastodon.de/tags/surveillance" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>surveillance</span></a> of all types of assets is a means of monitoring the compliance of the majority, and of detecting deviant behavior. Legalizing more and more monitoring options becomes a goal, including international partnerships on information exchange. Depriving you of your assets, temporarily or permanently, is a means of enforcing your compliance or obedience. The mere threat of this can be sufficient to create a <a href="https://mastodon.de/tags/ChillingEffect" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ChillingEffect</span></a>.</p><p>State-sponsored actors (such as hacker groups) and nation-state threat actors (in the form of intelligence services, law enforcement, censorship offices, and other <a href="https://mastodon.de/tags/government" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>government</span></a> agencies) fall into this category. It also includes <a href="https://mastodon.de/tags/companies" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>companies</span></a> that have either a monopoly, or a significant share of an oligopolistic market, or portfolio of services specifically targeted at the public sector.</p><p>While the entities in this category may seem wildly heterogeneous at first, remember that there are <a href="https://mastodon.de/tags/RevolvingDoors" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RevolvingDoors</span></a> between them, for swapping their respective “ex” members. Beyond lobbying, there is also a complex, ongoing collaboration between many of them, which has been described as “grey intelligence”, “grey policing”, “public-private partnership”, etc.</p><p>Start of this thread:<br><a href="https://mastodon.de/@tuxwise/113503228291818865" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113503228</span><span class="invisible">291818865</span></a></p><p><a href="https://mastodon.de/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatModeling</span></a> <a href="https://mastodon.de/tags/4D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4D</span></a></p>
Jonathan Kamens 86 47<p>On a list I'm on, someone asks for advice protecting a small trans support org worried about e.g. keeping their membership list safe.<br>Several people respond, "Talk to company &lt;x&gt;, they help non-profits secure infra."<br>I look at &lt;x&gt;. Its flagship product automates managing security controls in apps like Google Workspace and Slack.<br>I'm like, this isn't going to help when the subpoenas start flying. Y'all need to change your threat model.<br><a href="https://federate.social/tags/smdh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>smdh</span></a> <a href="https://federate.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://federate.social/tags/threatModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatModeling</span></a> <a href="https://federate.social/tags/politics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>politics</span></a> <a href="https://federate.social/tags/USPol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USPol</span></a></p>
tuxwise<p>(2/N) The "<a href="https://mastodon.de/tags/ThreatModelingManifesto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatModelingManifesto</span></a>" is a great framework for businesses and organizations. Applying it to a more private context becomes easier for me when I make its key questions more personal:</p><ol><li>What are you working on?</li><li>What can go wrong?</li><li>What are you going to do about it?</li><li>Did you do a good enough job?</li></ol><p>Next two posts will cover my answers to 1).</p><p><a href="https://www.threatmodelingmanifesto.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">threatmodelingmanifesto.org/</span><span class="invisible"></span></a></p><p>Note: Essentially, the <a href="https://mastodon.de/tags/4D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4D</span></a>​s are my answers to 3).</p><p><a href="https://mastodon.de/@tuxwise/113503228291818865" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mastodon.de/@tuxwise/113503228</span><span class="invisible">291818865</span></a></p><p><a href="https://mastodon.de/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatModeling</span></a> <a href="https://mastodon.de/tags/4D" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4D</span></a></p>
shellsharks<p>What methodology is your "go to” when conducting a <a href="https://shellsharks.social/tags/threatmodeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatmodeling</span></a> exercise? For infosec folks, do you or your team use a specific methodology for threat modeling systems at your respective org?</p>