mirror of
				https://github.com/privacyguides/privacyguides.org.git
				synced 2025-11-04 05:17:57 +00:00 
			
		
		
		
	Clarify meaning of sentence in threat modeling guide (#2375)
Co-authored-by: Jonah Aragon <jonah@triplebit.net> Signed-off-by: Freddy <freddy@privacyguides.org> Signed-off-by: Daniel Gray <dngray@privacyguides.org>
This commit is contained in:
		@@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
*Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.*
 | 
					*Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.*
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning.
 | 
					Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
### How likely is it that I will need to protect it?
 | 
					### How likely is it that I will need to protect it?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
		Reference in New Issue
	
	Block a user