1
0
mirror of https://github.com/privacyguides/privacyguides.org.git synced 2025-07-03 01:52:39 +00:00

Clarify meaning of sentence in threat modeling guide (#2375)

Co-authored-by: Jonah Aragon <jonah@triplebit.net>
Signed-off-by: Freddy <freddy@privacyguides.org>
Signed-off-by: Daniel Gray <dngray@privacyguides.org>
This commit is contained in:
Feni Brian
2024-02-01 08:41:19 +03:00
committed by GitHub
parent f1864a4062
commit 01c19281f7

View File

@ -37,7 +37,7 @@ To answer this question, it's important to identify who might want to target you
*Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.* *Make a list of your adversaries or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations.*
Depending on who your adversaries are, under some circumstances, this list might be something you want to destroy after you're done security planning. Depending on who your adversaries are, this list might be something you want to destroy after you've finished developing your threat model.
### How likely is it that I will need to protect it? ### How likely is it that I will need to protect it?