OK, #threatModel time.
our team does not like being asked for "templates" or “outlines" of our workshops. each TM is different in terms of where we spend our time.
we know the areas that must be covered in #security and #privacy #threatmodels, and i've been writing a play/runbook (pattern?) for the format of our workshops that is becoming training material.
but i don't want it to be a #template. what would you use? agenda? areas of interest? pattern? outline?
happy wednesday, #infosec!
#threatmodel #security #privacy #threatmodels #template #infosec
Security Analysis of Threema https://www.schneier.com/blog/archives/2023/01/security-analysis-of-threema.html #side-channelattacks #vulnerabilities #academicpapers #authentication #Uncategorized #cryptanalysis #threatmodels #encryption
#side #vulnerabilities #academicpapers #authentication #Uncategorized #cryptanalysis #threatmodels #encryption
Threats of Machine-Generated Text https://www.schneier.com/blog/archives/2023/01/threats-of-machine-generated-text.html #machinelearning #academicpapers #Uncategorized #threatmodels #ChatGPT #privacy
#machinelearning #academicpapers #Uncategorized #threatmodels #chatgpt #privacy
#AI #threatmodels
I thought it might be cool to have a collection of AI Evasion, detection and adversiall Attacks Papers, given that my dominant hobby right now is writing an AI video Editor for stable diffusion. So let's begin:
First of all will be GPT-3 Bot detection
https://arxiv.org/abs/2210.07321
Followed by AI Person Detection :
https://arxiv.org/abs/1910.11099
Feel free to add your findings. :)
New Sophisticated Malware https://www.schneier.com/blog/archives/2022/05/new-sophisticated-malware.html #Uncategorized #threatmodels #backdoors #botnets #malware
#Uncategorized #threatmodels #backdoors #botnets #malware
Bunnie Huang’s Plausibly Deniable Database https://www.schneier.com/blog/archives/2022/02/bunnie-huangs-plausibly-deniable-database.html #academicpapers #Uncategorized #cryptanalysis #threatmodels #deniability #databases #metadata
#academicpapers #Uncategorized #cryptanalysis #threatmodels #deniability #databases #metadata
Advice for Personal Digital Security https://www.schneier.com/blog/archives/2021/11/advice-for-personal-digital-security.html #securityanalysis #riskassessment #Uncategorized #cybersecurity #threatmodels
#securityanalysis #riskassessment #Uncategorized #cybersecurity #threatmodels
@galaxis I made a similar point aboout the execution of Kim Jung-nam:
Data are Liability: Book your Assassination Now
Travel and hospitality databases are widely accessible and shared amongst a tremendous number of organisations. State intelligence organisations might readily have access through their own state-run airline, or through private operations or plants within same. Similarly for terrorist, narco-criminal, money-laundering, or other organisations. Financial, banking, and payment-processing systems, only slightly less so. A P.I. license or position on a fraud or abuse desk at a major online retailer, or any skip-tracing agency, can have access to such information.
What is your threat model?
https://old.reddit.com/r/dredmorbius/comments/5ud243/data_are_liability_book_your_assassination_now/
#DataAreLiability #Belarus #kidnapping #assassination #ThreatModels
#dataareliability #belarus #kidnapping #assassination #threatmodels
DNI’s Annual Threat Assessment https://www.schneier.com/blog/archives/2021/04/dnis-annual-threat-assessment.html #nationalsecuritypolicy #Uncategorized #cybersecurity #threatmodels #supplychain
#nationalsecuritypolicy #Uncategorized #cybersecurity #threatmodels #supplychain
Threat Model Humor https://www.schneier.com/blog/archives/2021/03/threat-model-humor.html #Uncategorized #threatmodels #medicine #humor
#Uncategorized #threatmodels #medicine #humor
On Chinese-Owned Technology Platforms https://www.schneier.com/blog/archives/2021/02/on-chinese-owned-technology-platforms.html #nationalsecuritypolicy #Uncategorized #threatmodels #reports #China
#nationalsecuritypolicy #Uncategorized #threatmodels #reports #china
Cyber Public Health https://www.schneier.com/blog/archives/2020/11/cyber-public-health.html #infrastructure #Uncategorized #cybersecurity #threatmodels #video
#infrastructure #Uncategorized #cybersecurity #threatmodels #video
Trust and Safety: Information Resources?
I'm looking for information, references, or other pointers, on current or best practices as well aas scope or definition, of online trust & safety or abuse areas. Possibly also relationships or differences from security, threat, legal compliance, or related measures.
Anyone w/ experience on the Fediverse, industry, organisations, or research, insight appreciated.
Boosts welcome.
#TrustAndSafety #security #threatmodels
Ramsey Malware https://www.schneier.com/blog/archives/2020/05/ramsey_malware.html #threatmodels #southkorea #databases #airgaps #malware
#threatmodels #southkorea #databases #airgaps #malware
Failure Modes in Machine Learning https://www.schneier.com/blog/archives/2019/12/failure_modes_i.html #machinelearning #academicpapers #threatmodels #taxonomies
#machinelearning #academicpapers #threatmodels #taxonomies