From 04544127f8cf80edab936621c088f9f898847252 Mon Sep 17 00:00:00 2001
From: TwoSixtyThreeFiftyFour
<108928957+TwoSixtyThreeFiftyFour@users.noreply.github.com>
Date: Mon, 29 Aug 2022 17:14:14 +0000
Subject: [PATCH] Update guide.md
---
guide.md | 3 +++
1 file changed, 3 insertions(+)
diff --git a/guide.md b/guide.md
index d29b24e..2471c33 100644
--- a/guide.md
+++ b/guide.md
@@ -12389,6 +12389,9 @@ Here are various threat modeling resources if you want to go deeper in threat mo
- It is focused on privacy but is clearly perfectly suitable for anonymity.
- It is accessible to all skill levels including beginners (providing many tutorials) but also suitable for highly skilled readers.
- It is used in the making of the Threat Modeling Manifesto: [[Archive.org]](https://web.archive.org/web/https://www.threatmodelingmanifesto.org/)
+ - Here are two videos explaining LINDDUN from the designers themselves:
+ - Privacy & prejudice: on privacy threat modeling misconceptions by Kim Wuyts: [[Invidious]](https://yewtu.be/watch?v=zI4SFyq_Xjw)
+ - Privacy Threat Model Using LINDDUN by Kim Wuyts: [[Invidious]](https://yewtu.be/watch?v=C9F8X1j9Zpg>)
![][1389]
(Illustration from [LINDDUN2015](https://lirias.kuleuven.be/retrieve/295669)