

Q&A: Understanding Threat Modeling
Nov 6, 2024
Explore the intricacies of threat modeling and how it can fortify personal security practices. Discover the security concerns surrounding custom Android ROMs, from update delays to privacy myths. The hosts share a shocking story about a user’s 2FA woes with Facebook, questioning the reliability of such safeguards. Engage with listener questions as they delve into the privacy implications of social media use and how community support enhances awareness and knowledge. Join them for insights that blend tech knowledge with real-world applications!
AI Snips
Chapters
Transcript
Episode notes
Threat Modeling Expertise
- Threat modeling requires experience to distinguish realistic vs. unrealistic threats.
- It involves understanding how tools and concepts fit into overall risk assessment.
Techlore's Journey
- Techlore's early advice was more extreme, now it's nuanced with context.
- They are trying to find ways to convey experience without people going through extreme measures.
The New Oil's Privacy Awakening
- The New Oil's privacy awakening came from a podcast discussing ecosystem risks.
- They realized the vulnerability of keeping all data in one place, like Google.