You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/basics/threat-modeling.en.md
+44-57Lines changed: 44 additions & 57 deletions
Original file line number
Diff line number
Diff line change
@@ -5,20 +5,14 @@ icon: 'material/target-account'
5
5
6
6
Balancing security, privacy, and usability is one of the first and most difficult tasks you'll face on your privacy journey. Everything is a trade-off: The more secure something is, the more restricting or inconvenient it generally is, et cetera. Often people find that the problem with the tools they see recommended is they're just too hard to start using!
7
7
8
-
If you wanted to use the **most** secure tools available, you'd have to sacrifice *a lot* of usability. And even then, <mark>nothing is ever fully secure.</mark> There's **high** security, but never **full** security. That's why threat models are important.
8
+
If you wanted to use the **most** secure tools available, you'd have to sacrifice *a lot* of usability. And even then, ==nothing is ever fully secure.== There's **high** security, but never **full** security. That's why threat models are important.
9
9
10
10
**So, what are these threat models anyways?**
11
11
12
-
<mark>A threat model is a list of the most probable threats to your security/privacy endeavors.</mark> Since it's impossible to protect yourself against **every** attack(er), you should focus on the **most probable** threats. In computer security, a threat is a potential event that could undermine your efforts to stay private and secure.
12
+
==A threat model is a list of the most probable threats to your security/privacy endeavors.== Since it's impossible to protect yourself against **every** attack(er), you should focus on the **most probable** threats. In computer security, a threat is a potential event that could undermine your efforts to stay private and secure.
13
13
14
14
By focusing on the threats that matter to you, this narrows down your thinking about the protection you need, so you can choose the tools that are right for the job.
15
15
16
-
## Examples of threat models
17
-
18
-
* An investigative journalist's threat model might be <spanclass="text-muted">(protecting themselves against)</span> a foreign government.
19
-
* A company's manager's threat model might be <spanclass="text-muted">(protecting themselves against)</span> a hacker hired by competition to do corporate espionage.
20
-
* The average citizen's threat model might be <spanclass="text-muted">(hiding their data from)</span> large tech corporations.
21
-
22
16
## Creating your threat model
23
17
24
18
To identify what could happen to the things you value and determine from whom you need to protect them, you want to answer these five questions:
@@ -29,53 +23,23 @@ To identify what could happen to the things you value and determine from whom yo
29
23
4. How bad are the consequences if I fail?
30
24
5. How much trouble am I willing to go through to try to prevent potential consequences?
31
25
32
-
### Example: Protecting your belongings
33
-
34
-
* To demonstrate how these questions work, let's build a plan to keep your house and possessions safe.
35
-
36
-
#### What do you want to protect? (Or, *what do you have that is worth protecting?*)
37
-
38
-
* Your assets might include jewelry, electronics, important documents, or photos.
39
-
40
-
#### Who do you want to protect it from?
41
-
42
-
* Your adversaries might include burglars, roommates, or guests.
43
-
44
-
#### How likely is it that you will need to protect it?
45
-
46
-
* Does your neighborhood have a history of burglaries? How trustworthy are your roommates/guests? What are the capabilities of your adversaries? What are the risks you should consider?
47
-
48
-
#### How bad are the consequences if you fail?
49
-
50
-
* Do you have anything in your house that you cannot replace? Do you have the time or money to replace these things? Do you have insurance that covers goods stolen from your home?
51
-
52
-
#### How much trouble are you willing to go through to prevent these consequences?
53
-
54
-
* Are you willing to buy a safe for sensitive documents? Can you afford to buy a high-quality lock? Do you have time to open a security box at your local bank and keep your valuables there?
55
-
56
-
Only once you have asked yourself these questions will you be in a position to assess what measures to take. If your possessions are valuable, but the probability of a break-in is low, then you may not want to invest too much money in a lock. But, if the probability of a break-in is high, you'll want to get the best lock on the market, and consider adding a security system.
57
-
58
-
Making a security plan will help you to understand the threats that are unique to you and to evaluate your assets, your adversaries, and your adversaries' capabilities, along with the likelihood of risks you face.
59
-
60
-
Now, let's take a closer look at the questions in our list:
61
-
62
26
### What do I want to protect?
63
27
64
-
An “asset” is something you value and want to protect. In the context of digital security, <mark>an asset is usually some kind of information.</mark> For example, your emails, contact lists, instant messages, location, and files are all possible assets. Your devices themselves may also be assets.
28
+
An “asset” is something you value and want to protect. In the context of digital security, ==an asset is usually some kind of information.== For example, your emails, contact lists, instant messages, location, and files are all possible assets. Your devices themselves may also be assets.
65
29
66
30
*Make a list of your assets: data that you keep, where it's kept, who has access to it, and what stops others from accessing it.*
67
31
68
32
### Who do I want to protect it from?
69
33
70
-
To answer this question, it's important to identify who might want to target you or your information. <mark>A person or entity that poses a threat to your assets is an “adversary.”</mark> Examples of potential adversaries are your boss, your former partner, your business competition, your government, or a hacker on a public network.
34
+
To answer this question, it's important to identify who might want to target you or your information. ==A person or entity that poses a threat to your assets is an “adversary.”== Examples of potential adversaries are your boss, your former partner, your business competition, your government, or a hacker on a public network.
71
35
72
36
*Make a list of your adversaries, or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.*
73
37
74
38
Depending on who your adversaries are, under some circumstances this list might be something you want to destroy after you're done security planning.
75
39
76
40
### How likely is it that I will need to protect it?
77
41
78
-
<mark>Risk is the likelihood that a particular threat against a particular asset will actually occur.</mark> It goes hand-in-hand with capability. While your mobile phone provider has the capability to access all of your data, the risk of them posting your private data online to harm your reputation is low.
42
+
==Risk is the likelihood that a particular threat against a particular asset will actually occur.== It goes hand-in-hand with capability. While your mobile phone provider has the capability to access all of your data, the risk of them posting your private data online to harm your reputation is low.
79
43
80
44
It is important to distinguish between what might happen and the probability it may happen. For instance, there is a threat that your building might collapse, but the risk of this happening is far greater in San Francisco (where earthquakes are common) than in Stockholm (where they are not).
81
45
@@ -87,31 +51,54 @@ Assessing risks is both a personal and a subjective process. Many people find ce
87
51
88
52
There are many ways that an adversary could gain access to your data. For example, an adversary can read your private communications as they pass through the network, or they can delete or corrupt your data.
89
53
90
-
<mark>The motives of adversaries differ widely, as do their tactics.</mark> A government trying to prevent the spread of a video showing police violence may be content to simply delete or reduce the availability of that video. In contrast, a political opponent may wish to gain access to secret content and publish that content without you knowing.
54
+
==The motives of adversaries differ widely, as do their tactics.== A government trying to prevent the spread of a video showing police violence may be content to simply delete or reduce the availability of that video. In contrast, a political opponent may wish to gain access to secret content and publish that content without you knowing.
91
55
92
56
Security planning involves understanding how bad the consequences could be if an adversary successfully gains access to one of your assets. To determine this, you should consider the capability of your adversary. For example, your mobile phone provider has access to all your phone records. A hacker on an open Wi-Fi network can access your unencrypted communications. Your government might have stronger capabilities.
93
57
94
58
*Write down what your adversary might want to do with your private data.*
95
59
96
60
### How much trouble am I willing to go through to try to prevent potential consequences?
97
61
98
-
<mark>There is no perfect option for security.</mark> Not everyone has the same priorities, concerns, or access to resources. Your risk assessment will allow you to plan the right strategy for you, balancing convenience, cost, and privacy.
62
+
==There is no perfect option for security.== Not everyone has the same priorities, concerns, or access to resources. Your risk assessment will allow you to plan the right strategy for you, balancing convenience, cost, and privacy.
99
63
100
64
For example, an attorney representing a client in a national security case may be willing to go to greater lengths to protect communications about that case, such as using encrypted email, than a mother who regularly emails her daughter funny cat videos.
101
65
102
66
*Write down what options you have available to you to help mitigate your unique threats. Note if you have any financial constraints, technical constraints, or social constraints.*
<li><a href="https://ssd.eff.org/en/module/your-security-plan">EFF Surveillance Self Defense: Your Security Plan</a></li>
115
-
</ul>
116
-
</div>
117
-
</div>
68
+
### Try it yourself: Protecting your belongings
69
+
70
+
These questions can apply to a wide variety of situations, online and offline. As a generic demonstration of how these questions work, let's build a plan to keep your house and possessions safe.
71
+
72
+
**What do you want to protect? (Or, *what do you have that is worth protecting?*)**
73
+
74
+
: Your assets might include jewelry, electronics, important documents, or photos.
75
+
76
+
**Who do you want to protect it from?**
77
+
78
+
: Your adversaries might include burglars, roommates, or guests.
79
+
80
+
**How likely is it that you will need to protect it?**
81
+
82
+
: Does your neighborhood have a history of burglaries? How trustworthy are your roommates/guests? What are the capabilities of your adversaries? What are the risks you should consider?
83
+
84
+
**How bad are the consequences if you fail?**
85
+
86
+
: Do you have anything in your house that you cannot replace? Do you have the time or money to replace these things? Do you have insurance that covers goods stolen from your home?
87
+
88
+
**How much trouble are you willing to go through to prevent these consequences?**
89
+
90
+
: Are you willing to buy a safe for sensitive documents? Can you afford to buy a high-quality lock? Do you have time to open a security box at your local bank and keep your valuables there?
91
+
92
+
Only once you have asked yourself these questions will you be in a position to assess what measures to take. If your possessions are valuable, but the probability of a break-in is low, then you may not want to invest too much money in a lock. But, if the probability of a break-in is high, you'll want to get the best lock on the market, and consider adding a security system.
93
+
94
+
Making a security plan will help you to understand the threats that are unique to you and to evaluate your assets, your adversaries, and your adversaries' capabilities, along with the likelihood of risks you face.
95
+
96
+
## Further reading
97
+
98
+
For people looking to increase their privacy and security online, we've compiled a list of common threats our visitors face or goals our visitors have, to give you some inspiration and demonstrate the basis of our recommendations.
99
+
100
+
-[Common Goals and Threats :material-arrow-right:](common-threats.md)
101
+
102
+
## Sources
103
+
104
+
-[EFF Surveillance Self Defense: Your Security Plan](https://ssd.eff.org/en/module/your-security-plan)
Copy file name to clipboardExpand all lines: docs/index.en.md
+2Lines changed: 2 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -15,6 +15,8 @@ hide:
15
15
Much like the right to interracial marriage, woman's suffrage, freedom of speech, and many others, we didn't always have the right to privacy. In several dictatorships, many still don't. Generations before ours fought for our right to privacy. ==Privacy is a human right inherent to all of us== that we are entitled to without discrimination.
16
16
17
17
You shouldn't confuse privacy with secrecy. We know what happens in the bathroom, but you still close the door. That's because you want privacy, not secrecy. **Everyone** has something to hide, privacy is something that makes you human.
18
+
19
+
[:material-target-account: Common Internet Threats](basics/common-threats.md){ .md-button .md-button--primary }
Copy file name to clipboardExpand all lines: theme/overrides/home.en.html
+4-4Lines changed: 4 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -16,11 +16,11 @@
16
16
<divclass="mdx-hero__content">
17
17
<h1>The guide to restoring your online privacy.</h1>
18
18
<p>Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect yourself online.</p>
19
-
<ahref="tools/" title="Recommended privacy tools, services, and knowledge" class="md-button md-button--primary">
20
-
Recommended Tools
19
+
<ahref="basics/threat-modeling/" title="The first step of your privacy journey" class="md-button md-button--primary">
20
+
Start Your Privacy Journey
21
21
</a>
22
-
<ahref="https://blog.privacyguides.org/" title="Blog posts from Privacy Guides contributors" class="md-button">
23
-
Read our blog
22
+
<ahref="tools/" title="Recommended privacy tools, services, and knowledge" class="md-button">
0 commit comments