this post was submitted on 06 Feb 2025
38 points (89.6% liked)

Privacy

742 readers
30 users here now

Protect your privacy in the digital world

Welcome! This is a community for all those who are interested in protecting their privacy.

Rules

~PS: Don't be a smartass and try to game the system, we'll know if you're breaking the rules when we see it!~

  1. Be nice, civil and no bigotry/prejudice.
  2. No tankies/alt-right fascists. The former can be tolerated but the latter are banned.
  3. Stay on topic.
  4. Don't promote proprietary software.
  5. No crypto, blockchain, etc.
  6. No Xitter links. (only allowed when can't fact check any other way, use xcancel)
  7. If you post news exclusive to a country please name it. ~(This isn't a bannable rule, just a recommendation!)~
  8. If in doubt, read rule 1

Related communities:

founded 3 months ago
MODERATORS
 

Example: Intel ME, AMD PSP, and potential backdoor in the "Baseband Processor" in phones...

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 15 points 4 days ago

You may have already seen this, but if not

https://www.privacyguides.org/en/basics/threat-modeling/

If you wanted to use the most secure tools available, you'd have to sacrifice a lot of usability. And, even then, nothing is ever fully secure. There's high security, but never full security. That's why threat models are important.

A threat model is a list of the most probable threats to your security and privacy endeavors. Since it's impossible to protect yourself against every attack(er), you should focus on the most probable threats. In computer security, a threat is an event that could undermine your efforts to stay private and secure.

You could break it down further

  • what are you trying to protect day to day
  • what do you need to take extra steps for