From 0ef3728442073c0d360a2049ca3063c5e18227d6 Mon Sep 17 00:00:00 2001
From: TwoSixtyThreeFiftyFour
<108928957+TwoSixtyThreeFiftyFour@users.noreply.github.com>
Date: Thu, 4 Aug 2022 15:00:20 +0000
Subject: [PATCH] Update of the threat modeling section
Update of the threat modeling section
---
guide.md | 25 +++++++++++--------------
1 file changed, 11 insertions(+), 14 deletions(-)
diff --git a/guide.md b/guide.md
index 7e6eb53..63f8d3a 100644
--- a/guide.md
+++ b/guide.md
@@ -12389,26 +12389,24 @@ Also please consider reading: ** [[Archive.org]][739]
+- The one we recommend: LINDDUN [[Archive.org]][739].
+ - They provide an online tool to help making your threat model online at [[Archive.org]](https://web.archive.org/web/https://www.linddun.org/go).
+ - LINDDUN is focused on Privacy but clearly are also perfectly suitable for Anonymity.
+ - LINDDUN is accessible to all skill levels including beginners (providing many tutorials) but also suitable for highly skilled users.
+ - LINDDUN is active in the making of the Threat Modeling Manifesto: [[Archive.org]][745]
+
+Here are alternative resources and models if LINDDUN doesn't suit you:
+
+- Online Operations Security: [https://web.archive.org/web/20210711215728/https://github.com/devbret/online-OPSEC]
- STRIDE [[Wikiless]][740] [[Archive.org]][741]
- PASTA [[Archive.org]][742]
-
-And there are quite a few others too, see:
-
+
- [[Archive.org]][743]
- [[Archive.org]][744]
-You can find some introduction on these on these projects:
-
-- Threat Modeling Manifesto: [[Archive.org]][745]
-
-- OWASP: [[Archive.org]][746]
-
-- Online Operations Security: [https://web.archive.org/web/20210711215728/https://github.com/devbret/online-OPSEC]
-
# Appendix B4: Important notes about evil-maid and tampering
Your context needs to be taken into account.
@@ -14513,7 +14511,6 @@ See the [Some last OPSEC thoughts][Some last OPSEC thoughts:] section for some t
[743]: https://web.archive.org/web/https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/
[744]: https://web.archive.org/web/https://www.geeksforgeeks.org/threat-modelling/
[745]: https://web.archive.org/web/https://www.threatmodelingmanifesto.org/
- [746]: https://web.archive.org/web/https://cheatsheetseries.owasp.org/cheatsheets/Threat_Modeling_Cheat_Sheet.html
[https://web.archive.org/web/20210711215728/https://github.com/devbret/online-OPSEC]: https://web.archive.org/web/20210711215728/https://github.com/devbret/online-opsec
[747]: https://web.archive.org/web/https://www.huntonprivacyblog.com/wp-content/uploads/sites/28/2016/02/Telemedia_Act__TMA_.pdf
[748]: https://wikiless.org/wiki/Don%27t_be_evil
@@ -15152,4 +15149,4 @@ See the [Some last OPSEC thoughts][Some last OPSEC thoughts:] section for some t
[1384]: https://web.archive.org/web/20220718231735/https://officercia.mirror.xyz/5KSkJOTgMtvgC36v1GqZ987N-_Oj_zwvGatOk0A47Ws
[1385]: https://web.archive.org/web/20220516000616/https://officercia.mirror.xyz/WeAilwJ9V4GIVUkYa7WwBwV2II9dYwpdPTp3fNsPFjo
[1386]: https://web.archive.org/web/20220720023429/https://leakuidatorplusteam.github.io/
- [1387]: https://web.archive.org/web/20220801151048/https://support.torproject.org/glossary/moat/
\ No newline at end of file
+ [1387]: https://web.archive.org/web/20220801151048/https://support.torproject.org/glossary/moat/