An Information Security Community
Many people don't know or haven't heard of threat modeling let alone know how to do it.
Hackers and crackers break assumptions we have made for how a system will be used.
But how to make the right assumptions? One way is to predict evil based on past known threats.
This might be a good start but it's not enough because hackers will also break the assumptions we make based on past attacks and change their behavior.
The better assumption is that all input…Continue