mirror of
https://github.com/PrivSec-dev/privsec.dev
synced 2024-12-22 12:51:34 -05:00
Images for Threat Modeling post
Signed-off-by: Tommy <contact@tommytran.io>
This commit is contained in:
parent
8b9640bb43
commit
172ea326d1
@ -8,6 +8,8 @@ The first task a person should do when taking steps to protect their privacy and
|
|||||||
|
|
||||||
## Defining a threat
|
## Defining a threat
|
||||||
|
|
||||||
|
![Cameras in Trees](/cameras-in-trees.jpg)
|
||||||
|
|
||||||
To make a threat model, we must first define a threat. A common mistake made by people who are just getting into the privacy space is to define the threat as "big-tech companies." There is a fundamental problem with this definition:
|
To make a threat model, we must first define a threat. A common mistake made by people who are just getting into the privacy space is to define the threat as "big-tech companies." There is a fundamental problem with this definition:
|
||||||
|
|
||||||
Why are we not trusting "big-tech companies," but then shift our trust to "small-tech companies"? What happens if those "small-tech companies" turn out to be malicious? What happens when our favorite "small-tech company" becomes successful and grow exponentially? **The proper way to define the threat here is the "service provider," not "big-tech."**
|
Why are we not trusting "big-tech companies," but then shift our trust to "small-tech companies"? What happens if those "small-tech companies" turn out to be malicious? What happens when our favorite "small-tech company" becomes successful and grow exponentially? **The proper way to define the threat here is the "service provider," not "big-tech."**
|
||||||
@ -25,6 +27,8 @@ For whistleblowers, the threat model is much more extreme. Beyond what is mentio
|
|||||||
|
|
||||||
## Privacy from service providers
|
## Privacy from service providers
|
||||||
|
|
||||||
|
![Camera Drawing](/camera-drawing.jpg)
|
||||||
|
|
||||||
In most setups, our "private" messages, emails, social interactions are typically stored on a server somewhere. The obvious problem with this is that the service provider (or a hacker who has compromised the server) can look into your "private" conversations whenever and however they want, without you ever knowing. This applies to many common services like SMS messaging, Telegram, Discord, and so on.
|
In most setups, our "private" messages, emails, social interactions are typically stored on a server somewhere. The obvious problem with this is that the service provider (or a hacker who has compromised the server) can look into your "private" conversations whenever and however they want, without you ever knowing. This applies to many common services like SMS messaging, Telegram, Discord, and so on.
|
||||||
|
|
||||||
With end-to-end encryption, you can alleviate this issue by encrypting communications between you and your desired recipients before they are even sent to the server. The confidentiality of your messages is guaranteed, so long as the service provider does not have access to the private keys of either party.
|
With end-to-end encryption, you can alleviate this issue by encrypting communications between you and your desired recipients before they are even sent to the server. The confidentiality of your messages is guaranteed, so long as the service provider does not have access to the private keys of either party.
|
||||||
@ -38,6 +42,9 @@ Therefore, when relying on end-to-end encryption, you should choose to use nativ
|
|||||||
Even with end-to-end encryption, service providers can still profile you based on **metadata**, which is typically not protected. While the service provider could not read your messages to see what you're saying, they can still observe things like who you're talking to, how often you message them, and what times you're typically active. Protection of metadata is fairly uncommon, and you should pay close attention to the technical documentation of the software you are using to see if there is any metadata minimization or protection at all, if that is a concern for you.
|
Even with end-to-end encryption, service providers can still profile you based on **metadata**, which is typically not protected. While the service provider could not read your messages to see what you're saying, they can still observe things like who you're talking to, how often you message them, and what times you're typically active. Protection of metadata is fairly uncommon, and you should pay close attention to the technical documentation of the software you are using to see if there is any metadata minimization or protection at all, if that is a concern for you.
|
||||||
|
|
||||||
## Protection from cross site/service tracking
|
## Protection from cross site/service tracking
|
||||||
|
|
||||||
|
![Surveillance Room](/surveillance-room.jpg)
|
||||||
|
|
||||||
You can be tracked across websites and services using some form of identifiers. These are typically:
|
You can be tracked across websites and services using some form of identifiers. These are typically:
|
||||||
|
|
||||||
- Your IP address
|
- Your IP address
|
||||||
@ -62,6 +69,8 @@ If you have already submitted your real information to a number of sites which s
|
|||||||
|
|
||||||
## Protection from malware and hackers
|
## Protection from malware and hackers
|
||||||
|
|
||||||
|
![Motherboard](/motherboard-1.jpg)
|
||||||
|
|
||||||
You need security to obtain any semblance of privacy: **Using tools which appear private is futile if they could easily be exploited by attackers to release your data later.**
|
You need security to obtain any semblance of privacy: **Using tools which appear private is futile if they could easily be exploited by attackers to release your data later.**
|
||||||
|
|
||||||
When it comes to application security, we generally do not (and sometimes cannot) know if the software that we use is malicious, or might one day become malicious. Even with the most trustworthy developers, there is generally no guarantee that their software does not have a serious vulnerability that could later be exploited.
|
When it comes to application security, we generally do not (and sometimes cannot) know if the software that we use is malicious, or might one day become malicious. Even with the most trustworthy developers, there is generally no guarantee that their software does not have a serious vulnerability that could later be exploited.
|
||||||
|
BIN
static/camera-drawing.jpg
Normal file
BIN
static/camera-drawing.jpg
Normal file
Binary file not shown.
After Width: | Height: | Size: 4.2 MiB |
BIN
static/cameras-in-trees.jpg
Normal file
BIN
static/cameras-in-trees.jpg
Normal file
Binary file not shown.
After Width: | Height: | Size: 2.6 MiB |
BIN
static/motherboard-1.jpg
Normal file
BIN
static/motherboard-1.jpg
Normal file
Binary file not shown.
After Width: | Height: | Size: 4.2 MiB |
BIN
static/surveillance-room.jpg
Normal file
BIN
static/surveillance-room.jpg
Normal file
Binary file not shown.
After Width: | Height: | Size: 3.1 MiB |
Loading…
Reference in New Issue
Block a user