I’ve been using one but I’m not sure what benefits I’m getting from it. I feel like the only thing happening is I’m adding a little bit of latency to all my requests for no reason.

  • TranquilTurbulence@lemmy.zip
    link
    fedilink
    arrow-up
    5
    ·
    edit-2
    1 day ago

    If you’ve never thought about threat models, here are some questions to get you started.

    1. List the assets that require protection. (Like credit card info)
    2. Who might want to gain access to those assets? (e.g. Hackers)
    3. How can you mitigate the risks? (Updates)

    You may have a lot to say, so write things down to clarify your thoughts. Once your threat model document is complete, it will be easier for you to figure it which tools you really need, and which ones are only nice to have.