mirror of
https://github.com/privacyguides/privacyguides.org
synced 2024-11-10 13:13:35 +01:00
Clarify meaning of sentence in threat modeling guide (#2375)
Co-authored-by: Jonah Aragon <jonah@triplebit.net> Signed-off-by: Freddy <freddy@privacyguides.org> Signed-off-by: Daniel Gray <dngray@privacyguides.org>
This commit is contained in:
parent
f1864a4062
commit
01c19281f7
@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you
|
|||||||
|
|
||||||
*Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.*
|
*Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.*
|
||||||
|
|
||||||
Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning.
|
Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
|
||||||
|
|
||||||
### How likely is it that I will need to protect it?
|
### How likely is it that I will need to protect it?
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user