From b9ace550c996a5b7bfd2b842d6a8b63f4be0ef8c Mon Sep 17 00:00:00 2001
From: pterocles
Date: Mon, 29 Aug 2022 16:27:01 -0400
Subject: [PATCH] Fix link
Signed-off-by: pterocles
---
guide.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/guide.md b/guide.md
index 573dd03..641e8d8 100644
--- a/guide.md
+++ b/guide.md
@@ -12390,7 +12390,7 @@ Here are various threat modeling resources if you want to go deeper in threat mo
- It is accessible to all skill levels including beginners (providing many tutorials) but also suitable for highly skilled readers.
- It is used in the making of the Threat Modeling Manifesto: [[Archive.org]](https://web.archive.org/web/https://www.threatmodelingmanifesto.org/)
- You can read more here: [A Lightweight Approach to Privacy Threat Modeling](https://sion.info/assets/pdf/publications/WuytsIWPE2020.pdf)
- - Here are two videos from [Dr. K. Wuyts](https://www.semanticscholar.org/author/K.-Wuyts/6439662) (imec-DistriNet, KU Leuven) explaining the process:
+ - Here are two videos from [Dr. K. Wuyts](https://www.semanticscholar.org/author/Kim-Wuyts/3190241) (imec-DistriNet, KU Leuven) explaining the process:
- [Privacy & prejudice: on privacy threat modeling misconceptions](https://www.youtube.com/watch?v=zI4SFyq_Xjw) [[Invidious]](https://yewtu.be/watch?v=zI4SFyq_Xjw)
- [Privacy Threat Model Using LINDDUN](https://www.youtube.com/watch?v=C9F8X1j9Zpg) [[Invidious]](https://yewtu.be/watch?v=C9F8X1j9Zpg>)