Emory L. · @emory
210 followers · 2029 posts · Server soc.kvet.ch

now if you'll excuse me i have a workshop to run. bbl <4

#threatmodel #infosec #security #deardiary

Last updated 1 year ago

Emory L. · @emory
210 followers · 2010 posts · Server soc.kvet.ch

i am back from traveling all over the place with children and it's very depleting. so i also took today off to not unpack anything, attend a call at work, play (seasonal rogue is coming into focus), and i am delighted that my replacement UPSen all worked great in my absence.

only one cyberpower unit remains. i don't even think i want to deal with having them serviced. i am that annoyed and disappointed. i'll be working tomorrow, have a
tomorrow!

#diablo4 #privacy #threatmodel

Last updated 1 year ago

DarkCyberMan · @darkcyberman
22 followers · 209 posts · Server nerdculture.de

It seems that someone stole a third of the solar panels from the roof of the solar energy collective that I’m part of. This was not in my threat model.

#threatmodel #solarpower #solar

Last updated 1 year ago

Emory L. · @emory
181 followers · 1857 posts · Server soc.kvet.ch

OK, time.

our team does not like being asked for "templates" or “outlines" of our workshops. each TM is different in terms of where we spend our time.

we know the areas that must be covered in and , and i've been writing a play/runbook (pattern?) for the format of our workshops that is becoming training material.

but i don't want it to be a . what would you use? agenda? areas of interest? pattern? outline?

happy wednesday, !

#threatmodel #security #privacy #threatmodels #template #infosec

Last updated 1 year ago

axleyjc · @axleyjc
97 followers · 284 posts · Server federate.social

Yes! Systems Theoretic Process Analysis (STPA) explicitly calls out the need to *analyze the mitigations* "for new hazards or causal scenarios" Security people don't tend to do this...

"Every solution for a safety problem usually has its own drawbacks and limitations and therefore they will need to be compared and decisions made about the best design given the particular situation involved. "

your mitigations!!

#threatmodel #security

Last updated 1 year ago

Henry · @hen
1665 followers · 883 posts · Server social.lol

@jacksonbarker We're on YouTube publishing public content. Nothing that happens in the public-facing part of what we're doing involves any layer of privacy.

TB is pretty necessary for us, as it's the only way we can mass-update our links/descriptions for all 400+ videos without doing it manually. Lots of other nice tools for creators in the suite.

#threatmodel

Last updated 1 year ago

mkj · @mkj
45 followers · 632 posts · Server social.linux.pizza

@al1r4d It's a common mistake to think of "security" as a binary quantity, as something that something either has or doesn't have. Security is rather a set of continuums; something which is secure against some threat for some degree of effort may be completely ineffective against additional effort, or against another threat. Which is why, if you want an answer to "is X secure?", you absolutely have to start out by at least roughly defining your .

#threatmodel #infosec #cybersecurity #security

Last updated 1 year ago

Emory L. · @emory
160 followers · 1302 posts · Server soc.kvet.ch

i think there's a lot of hype around this whole protests and strike thing at but if they would have done a workshop it would have been avoided about 70 minutes in when i start making a list of possible abuses and misuse of the system.

#feedly #threatmodel #infosec

Last updated 1 year ago

Emory L. · @emory
157 followers · 1020 posts · Server soc.kvet.ch

@maayanroth @mekkaokereke the day i accepted a job at ( ✊) the "People You Might Know" on LinkedIn were a brady-bunch wall of women. first time that happened. they weren't even in HR! <4

#comcastnbcu #threatmodel

Last updated 1 year ago

Emory L. · @emory
155 followers · 1011 posts · Server soc.kvet.ch

hello, . i would be interested in your opinions on something i do that people sometimes have strong opinions about:

i call our participants in workshops "constituents". we're not auditors, we aren't pentesters, we're architects that improve the security of the amazing things being built at .

i've been in operations orgs where internal teams are "customers" but i want something that sets a different relationship. yay/nay/other? .

#security #architects #threatmodel #Comcast #infosec

Last updated 1 year ago

Emory L. · @emory
155 followers · 1001 posts · Server soc.kvet.ch

i'm riding shotgun on a that our counterparts in UK are running as an emotional support architect and the lead of that team just suggested something and i am so annoyed i haven't been doing.

i log findings for systems that aren't requiring 1.3 or higher. but i talk about this as an infra weakness. she just asked about requiring 1.3 in their code, so that even if someone flips it back to 1.2 it won't establish connections with weak encryption in-flight.

do BOTH. code+infra.🤦‍♂️

#threatmodel #tls

Last updated 1 year ago

Royce Williams · @tychotithonus
1300 followers · 1012 posts · Server infosec.exchange

Good morning to everyone except the breathless threat modelers who think that that cross-registering a security key with a partner or close friend (for U2F/FIDO) is never acceptable for ordinary users, because it's ... "too risky".

You know what's risky? Properly maximizing the protection of FIDO (with "key-only" models like Google's Advanced Protection Program or Apple's new "all or nothing" key strategy) ... without sufficient redundancy.

If your partner or friend has your only-factor spare house or car key, but you're freaking out about using their everyday-carry second-factor security key as a tertiary key (for which they'd also have to intercept your password) ... your threat-modeling skills suck.

You're far more likely to DoS yourself than to get betrayed.

#fido2 #yubikey #threatmodel

Last updated 1 year ago

mkj · @mkj
33 followers · 418 posts · Server social.linux.pizza

@pseudonym There's a personal aspect to it as well. Does your personal include your own daily-use having serious issues even just for a few days? Card & electronic payments fail, online banking is unavailable, ... Can you manage? Now suppose this happens as important bills are due to be paid. Can you still manage? Sure, it's probably a fairly low-probability threat, but the consequences can be severe, so spending a little time thinking about the possibility might be worth it.

#threatmodel #bank

Last updated 1 year ago

🇩🇪 C.H. · @c_th1
109 followers · 150 posts · Server digitalcourage.social
mkj · @mkj
26 followers · 270 posts · Server social.linux.pizza

@kpwn If the assumes an active attacker willing to modify traffic in transit, as would be required for a downgrade or SSL Stripping attack, and that the initial request is over HTTP, then the attacker can strip out (and handle themselves, so it's transparent to the user; HTTP to HTTPS proxying wouldn't be hard) the initial redirection. Hence concepts like HSTS preloading and (the recent addition at least in Firefox of a configuration setting for) defaulting to HTTPS instead of HTTP.

#threatmodel

Last updated 1 year ago

Antonio Francesco Sardella · @m3ssap0
14 followers · 27 posts · Server infosec.exchange
Dude · @catchphrase
12 followers · 238 posts · Server halifaxsocial.ca

@TechNews

That is ignoring a person's
There are focused services. and

#opinion #threatmodel #privacy #vpn #mullvad #ivpn #proton

Last updated 1 year ago

Emory L. · @emory
137 followers · 728 posts · Server soc.kvet.ch

things have been a lot of fun at work lately and our team is hiring another security architect for our and secure design consult team.

you can ask me for a referral if you're interested, public link is jobs.comcast.com/jobs/descript

i didn't know i could be doing all the time until i met this team and our program is very mature, we've started privacy threat model workshops in late 2021. still time make it amazing with us!

#threatmodel #threatmodeling #infosec #jobs #security #securityarchitect

Last updated 1 year ago

Matt · @rangermatt
22 followers · 6 posts · Server hachyderm.io

I may just be overly paranoid, but seeing QR codes in TV Advertisements just triggers my InfoSec brain on a whole different level. We've spent so long training people not to open random files and emails and such and then we start seeing marketing people just throw random codes on a screen and expect people to scan away...

#threatmodel #infosec

Last updated 1 year ago

Emory L. · @emory
136 followers · 698 posts · Server soc.kvet.ch

@psychoframe @_L1vY_ that Friends of Dorothy story is part of my stage patter in my threat model workshops 🌈
i love it. i also always think of sir elton john's goodbye yellow brick road when i tell the story 🎶
#

#threatmodel #tradecraft

Last updated 1 year ago