Surveillance Report

Q&A: Understanding Threat Modeling

Nov 6, 2024
Explore the intricacies of threat modeling and how it can fortify personal security practices. Discover the security concerns surrounding custom Android ROMs, from update delays to privacy myths. The hosts share a shocking story about a user’s 2FA woes with Facebook, questioning the reliability of such safeguards. Engage with listener questions as they delve into the privacy implications of social media use and how community support enhances awareness and knowledge. Join them for insights that blend tech knowledge with real-world applications!
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Threat Modeling Expertise

  • Threat modeling requires experience to distinguish realistic vs. unrealistic threats.
  • It involves understanding how tools and concepts fit into overall risk assessment.
ANECDOTE

Techlore's Journey

  • Techlore's early advice was more extreme, now it's nuanced with context.
  • They are trying to find ways to convey experience without people going through extreme measures.
ANECDOTE

The New Oil's Privacy Awakening

  • The New Oil's privacy awakening came from a podcast discussing ecosystem risks.
  • They realized the vulnerability of keeping all data in one place, like Google.
Get the Snipd Podcast app to discover more snips from this episode
Get the app