From 04544127f8cf80edab936621c088f9f898847252 Mon Sep 17 00:00:00 2001 From: TwoSixtyThreeFiftyFour <108928957+TwoSixtyThreeFiftyFour@users.noreply.github.com> Date: Mon, 29 Aug 2022 17:14:14 +0000 Subject: [PATCH] Update guide.md --- guide.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/guide.md b/guide.md index d29b24e..2471c33 100644 --- a/guide.md +++ b/guide.md @@ -12389,6 +12389,9 @@ Here are various threat modeling resources if you want to go deeper in threat mo - It is focused on privacy but is clearly perfectly suitable for anonymity. - It is accessible to all skill levels including beginners (providing many tutorials) but also suitable for highly skilled readers. - It is used in the making of the Threat Modeling Manifesto: [[Archive.org]](https://web.archive.org/web/https://www.threatmodelingmanifesto.org/) + - Here are two videos explaining LINDDUN from the designers themselves: + - Privacy & prejudice: on privacy threat modeling misconceptions by Kim Wuyts: [[Invidious]](https://yewtu.be/watch?v=zI4SFyq_Xjw) + - Privacy Threat Model Using LINDDUN by Kim Wuyts: [[Invidious]](https://yewtu.be/watch?v=C9F8X1j9Zpg>) ![][1389] (Illustration from [LINDDUN2015](https://lirias.kuleuven.be/retrieve/295669)