mirror of
https://github.com/Anon-Planet/thgtoa.git
synced 2024-10-01 01:25:56 -04:00
Merge pull request #244 from Anon-Planet/LINDDUN-changes
Adding (reviewed/approved by LINDDUN designers) quick tutorial video link
This commit is contained in:
commit
1e66fdff9a
17
guide.md
17
guide.md
@ -12394,12 +12394,17 @@ Also please consider reading: [Privacy Limitations in Anonymity Networks with Mo
|
|||||||
|
|
||||||
Here are various threat modeling resources if you want to go deeper in threat modeling.
|
Here are various threat modeling resources if you want to go deeper in threat modeling.
|
||||||
|
|
||||||
- The one we recommend: LINDDUN <https://www.linddun.org> <sup>[[Archive.org]](https://web.archive.org/web/https://www.linddun.org/)</sup>
|
We recommend the LINDDUN <https://www.linddun.org> threat modeling method <sup>[[Archive.org]](https://web.archive.org/web/https://www.linddun.org/)</sup>:
|
||||||
- Researchers created an online tool to help make your threat model at <https://www.linddun.org/go> <sup>[[Archive.org]](https://web.archive.org/web/https://www.linddun.org/go)</sup>.
|
- Researchers created an online tool to help make your threat model at <https://www.linddun.org/go> <sup>[[Archive.org]](https://web.archive.org/web/https://www.linddun.org/go)</sup>.
|
||||||
- It is synergistic with STRIDE below.
|
- It is synergistic with STRIDE below.
|
||||||
- It is focused on privacy but is clearly perfectly suitable for anonymity.
|
- It is focused on privacy but is clearly perfectly suitable for anonymity.
|
||||||
- It is accessible to all skill levels including beginners (providing many tutorials) but also suitable for highly skilled readers.
|
- It is accessible to all skill levels including beginners (providing many tutorials) but also suitable for highly skilled readers.
|
||||||
- It is used in the making of the Threat Modeling Manifesto: <https://www.threatmodelingmanifesto.org/> <sup>[[Archive.org]](https://web.archive.org/web/https://www.threatmodelingmanifesto.org/)</sup>
|
- It is used in the making of the Threat Modeling Manifesto: <https://www.threatmodelingmanifesto.org/> <sup>[[Archive.org]](https://web.archive.org/web/https://www.threatmodelingmanifesto.org/)</sup>
|
||||||
|
|
||||||
|
LINDDUN threat modeling tutorials and resources:
|
||||||
|
- **We recommend the following quick tutorial video from "The Hated One" YouTube channel with the approval and review from LINDDDUN designers: <https://www.youtube.com/watch?v=6AXkJ3dot2s>** <sup>[[Invidious]](https://yewtu.be/watch?v=6AXkJ3dot2s>)</sup> to get started.
|
||||||
|
- More resources for deeper understanding and usage:
|
||||||
|
|
||||||
- You can read more here: [A Lightweight Approach to Privacy Threat Modeling](https://sion.info/assets/pdf/publications/WuytsIWPE2020.pdf)
|
- You can read more here: [A Lightweight Approach to Privacy Threat Modeling](https://sion.info/assets/pdf/publications/WuytsIWPE2020.pdf)
|
||||||
- Here are two videos from [Dr. K. Wuyts](https://www.semanticscholar.org/author/Kim-Wuyts/3190241) (imec-DistriNet, KU Leuven) explaining the process:
|
- Here are two videos from [Dr. K. Wuyts](https://www.semanticscholar.org/author/Kim-Wuyts/3190241) (imec-DistriNet, KU Leuven) explaining the process:
|
||||||
- [Privacy & prejudice: on privacy threat modeling misconceptions](https://www.youtube.com/watch?v=zI4SFyq_Xjw) <sup>[[Invidious]](https://yewtu.be/watch?v=zI4SFyq_Xjw)</sup>
|
- [Privacy & prejudice: on privacy threat modeling misconceptions](https://www.youtube.com/watch?v=zI4SFyq_Xjw) <sup>[[Invidious]](https://yewtu.be/watch?v=zI4SFyq_Xjw)</sup>
|
||||||
|
Loading…
Reference in New Issue
Block a user