From 90f6542b4b8a8ab434cbfca17a4a8f4ffbbebcfd Mon Sep 17 00:00:00 2001 From: Tim Vergenz Date: Sat, 23 Oct 2021 13:52:30 -0400 Subject: [PATCH] Minor spelling mistake (#198) Co-authored-by: Freddy --- collections/_evergreen/threat-modeling.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/collections/_evergreen/threat-modeling.html b/collections/_evergreen/threat-modeling.html index f50f939b..fd83404a 100644 --- a/collections/_evergreen/threat-modeling.html +++ b/collections/_evergreen/threat-modeling.html @@ -3,7 +3,7 @@ layout: evergreen title: What are threat models? --- -

Balancing security, privacy, and usability is one of the first and most difficult tasks you’ll face on your privacy journey. Everything is a trade-off: The more secure something is, the more restricting or convenient it generally is, et cetera. Often people find that the problem with the tools they see recommended is they’re just too hard to start using!

+

Balancing security, privacy, and usability is one of the first and most difficult tasks you’ll face on your privacy journey. Everything is a trade-off: The more secure something is, the more restricting or inconvenient it generally is, et cetera. Often people find that the problem with the tools they see recommended is they’re just too hard to start using!

If you wanted to use the most secure tools available, you’d have to sacrifice a lot of usability. And even then, nothing is ever fully secure. There’s high security, but never full security. That’s why threat models are important.