One Thing To Do Today: Threat Model 4, What the Ulitmate Threat Actor Sees
So now we look at our diagram as if we were one of our threat actor personas. To do things
Read moreSo now we look at our diagram as if we were one of our threat actor personas. To do things
Read moreBack on November 20th, Michelle kicked of the Civic Engagement Survival Guide with the Who’s My Representative Mini Hackathon. She not only
Read moreI’m the weirdo that loved diagraming sentences, so this next part makes me nerdily happy. Time to take one of
Read morelike many projects, this is a tale of knowing HOW, WHEN, and WHERE to start. i’m never quite sure. HOW does
Read moreIn the early 2000’s I marked some time as a Usability and Human Factors Professional, drawing on neglected novelist within to
Read moreOption 1: You know something can go wrong. “They” can get you …THEM…today it will be in some new way that
Read moreTL;DR Use ImageOptim or one of their recommendations to remove EXIF data off pictures before they go up on the
Read moreTL;DR – Protonmail, Tutanota rank as the easiest to use “secure” free email as service options. Might also consider Fastmail in conjunction
Read moreTL;DR If a device has a connection to a network, it needs a frequent update schedule. Computational devices on
Read moreTL;DR: Set StartPage or DuckDuckGo as the default search on your browser. Put the other in the bookmarks bar. Search engines know what we look for,
Read moreTL;DR: A VPN is a narrow tool. Use them accordingly. Virtual Private Networks evolved to connect remote workers into their organization’s network
Read moreI have a new friend. It’s the scripted voice on clickclickclick.click, a website keeping me company as I write this
Read more