-
### Session description
When a standard is written, it's required to write Security and Privacy Considerations and, if the technology is particularly disruptive, to sample the human rights impact.
On…
-
### Context
We want to learn more what is the effort for the given epic https://warthogs.atlassian.net/browse/KF-5510
### What needs to get done
1. Explore details of this epic https://warthogs.atl…
-
As part of the fuzzing discussion, it would be helpful to have threat modeling done for the various OTel components. This issue is to track any work that could be done to progress this.
-
**_301 Moved Permanently_: The [updated version of the Threat Model](https://github.com/w3c-cg/threat-modeling/blob/main/models/decentralized-identities.md) is in the [Threat Model Community Group](ht…
-
- ● https://www.threatmodelingmanifesto.org/
- ● https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/
- ● https://aws.amazon.com/blogs/security/how-to-approach-threat-modeling/
-…
-
Hey,
As part of Cyber security best practices principles, I could immediately and intuitively see that this project is missing the security requirements and implementations for protecting the syste…
-
### Session description
This is an interactive session to understand how to mitigate a [number of specific threats](https://lists.w3.org/Archives/Public/public-review-comments/2024Sep/0017.html) iden…
-
I saw a really good presentation about threat modeling. I think that this repository needs to help the lay community understand how their understanding of threat model (although, let's shy away from …
-
**Is your feature request related to a problem? Please describe.**
I'd like to download a copy for my archive of threat modeling work, and to have a linear presentation so I can be confident I've rea…
-
### What is this about?
https://app.circleci.com/pipelines/github/MetaMask/metamask-extension/103197/workflows/b61a6531-e4a8-43c0-a02f-c4fe2db2b6eb/jobs/3845864/tests
### Scenario
_No response_
##…