Threat Model Examples

I think most of the people on this site want a threat model that’s closer to journalistic level, but without Tor/QubesOS. That is, to have software that, when turned on, if possible protects you from any enemy.

1 Like

Thank you for this thorough response! This really helped. I like diagrams, I just don’t like drawing them or updating them. I think the OWASP tool is for teams and that currently does not reflect me so I’ll just juse some notation app.

I’ll try this method and maybe come up with my own derivative.

1 Like

I am trying to decouple my phone number from online services as much as I can, but some services force me to have coupled a phone number. What do u do in such cases?

I have thought to have a 2nd phone number just as 2FA for this few service that want me phone? so I could give a phone number, but nobody from my social graph knows I am own this phone.

Compartmentalize. Get multiple phone numbers. MySudo is great for this purpose. Depending where you live, this service (and other VoIP providers) may not be available in your region, and porting SIM numbers to VoIP involves a lot more steps compared to porting your number to a new SIM.

If I can’t get a VoIP number, and I could only work with one phone and 2 SIM numbers, personally, I would use one number for personal related things (messenger, banking, doctors, etc.) and the second number for work related things (work, job hunting, external calls, etc.). I would probably use a fake number for shopping since I never get calls or text related to delivery.

Most people I know use two phones, so that’s up to four different numbers you could use. This would be ideal if you want one of your numbers for social use only and the rest for work, shopping, banking, doctors, spam, etc. It’s up to you how you want to compartmentalize and what you can do with the phone numbers you have.