mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2025-01-02 11:26:29 -05:00
Clarify meaning of sentence in threat modeling guide (#2375)
Co-authored-by: Jonah Aragon <jonah@triplebit.net> Signed-off-by: Freddy <freddy@privacyguides.org> Signed-off-by: Daniel Gray <dngray@privacyguides.org>
This commit is contained in:
parent
f1864a4062
commit
01c19281f7
@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you
|
||||
|
||||
*Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.*
|
||||
|
||||
Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning.
|
||||
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||
|
||||
### How likely is it that I will need to protect it?
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user