diff --git a/guide.md b/guide.md index 2471c33..9e95787 100644 --- a/guide.md +++ b/guide.md @@ -12373,7 +12373,7 @@ The anonymity of Monero depends on its crypto algorithms. If you do use Monero f You may want to watch this insightful video for more details: [[Invidious]](https://yewtu.be/watch?v=j02QoI4ZlnU) -Also please consider reading: **** [[Archive.org]](https://web.archive.org/web/https://github.com/monero-project/monero/blob/master/docs/ANONYMITY_NETWORKS.md#privacy-limitations) +Also please consider reading: [Privacy Limitations in Anonymity Networks with Monero](https://github.com/monero-project/monero/blob/master/docs/ANONYMITY_NETWORKS.md#privacy-limitations) [[Archive.org]](https://web.archive.org/web/https://github.com/monero-project/monero/blob/master/docs/ANONYMITY_NETWORKS.md#privacy-limitations) **If you feel extra paranoid and want the highest safety level possible,** see the [Extra-Paranoid anonymous option][Extra-Paranoid anonymous option:]. @@ -12383,30 +12383,27 @@ Also please consider reading: ** [[Archive.org]](https://web.archive.org/web/https://www.linddun.org/). - - Researchers created an online tool to help make your threat model at [[Archive.org]](https://web.archive.org/web/https://www.linddun.org/go). +- The one we recommend: LINDDUN [[Archive.org]](https://web.archive.org/web/https://www.linddun.org/) + - Researchers created an online tool to help make your threat model at [[Archive.org]](https://web.archive.org/web/https://www.linddun.org/go). - It is synergistic with STRIDE below. - It is focused on privacy but is clearly perfectly suitable for anonymity. - It is accessible to all skill levels including beginners (providing many tutorials) but also suitable for highly skilled readers. - It is used in the making of the Threat Modeling Manifesto: [[Archive.org]](https://web.archive.org/web/https://www.threatmodelingmanifesto.org/) - - Here are two videos explaining LINDDUN from the designers themselves: - - Privacy & prejudice: on privacy threat modeling misconceptions by Kim Wuyts: [[Invidious]](https://yewtu.be/watch?v=zI4SFyq_Xjw) - - Privacy Threat Model Using LINDDUN by Kim Wuyts: [[Invidious]](https://yewtu.be/watch?v=C9F8X1j9Zpg>) + - You can read more here: [A Lightweight Approach to Privacy Threat Modeling](https://sion.info/assets/pdf/publications/WuytsIWPE2020.pdf) + - Here are two videos from K. Wuyts (imec-DistriNet, KU Leuven) explaining the process: + - [Privacy & prejudice: on privacy threat modeling misconceptions](https://www.youtube.com/watch?v=zI4SFyq_Xjw) [[Invidious]](https://yewtu.be/watch?v=zI4SFyq_Xjw) + - [Privacy Threat Model Using LINDDUN](https://www.youtube.com/watch?v=C9F8X1j9Zpg) [[Invidious]](https://yewtu.be/watch?v=C9F8X1j9Zpg>) ![][1389] -(Illustration from [LINDDUN2015](https://lirias.kuleuven.be/retrieve/295669) +(Illustration from [LINDDUN2015](https://lirias.kuleuven.be/retrieve/295669)) -Here are alternative resources and models if LINDDUN doesn't suit you: +Here are alternative resources and methodologies if LINDDUN doesn't suit you: -- Online Operations Security: [https://web.archive.org/web/20210711215728/https://github.com/devbret/online-OPSEC] - -- STRIDE [[Wikiless]](https://wikiless.org/wiki/STRIDE_%28security%29) [[Archive.org]](https://web.archive.org/web/https://en.wikipedia.org/wiki/STRIDE_%28security%29) - -- PASTA [[Archive.org]](https://web.archive.org/web/https://versprite.com/tag/pasta-threat-modeling/) - -- [[Archive.org]](https://web.archive.org/web/https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/) - -- [[Archive.org]](https://web.archive.org/web/https://www.geeksforgeeks.org/threat-modelling/) +- Online Operations Security: [https://github.com/devbret/online-OPSEC](https://web.archive.org/web/20210711215728/https://github.com/devbret/online-OPSEC) +- Microsoft's STRIDE: [[Wikiless]](https://wikiless.org/wiki/STRIDE_%28security%29) [[Archive.org]](https://web.archive.org/web/https://en.wikipedia.org/wiki/STRIDE_%28security%29) +- PASTA: [[Archive.org]](https://web.archive.org/web/https://versprite.com/tag/pasta-threat-modeling/) +- Threat Modeling: 12 Available Methods: [[Archive.org]](https://web.archive.org/web/https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/) +- Threat Modelling: [[Archive.org]](https://web.archive.org/web/https://www.geeksforgeeks.org/threat-modelling/) # Appendix B4: Important notes about evil-maid and tampering