mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,4 Tsd.
aktive Profile

#threatmodel

0 Beiträge0 Beteiligte0 Beiträge heute
Paco Hope wishes ill for JK Rowling<p>Maybe someone wants to explain the value of stupid AI prompts like the one in <a href="https://arxiv.org/pdf/2503.09586" rel="nofollow noopener" target="_blank">this paper</a>. They write:</p><blockquote><p>As a highly experienced threat modeler practitioner with over 20 years of experience, you have worked for one of the largest financial institutions in the world. </p></blockquote><p>First off, this is a classic <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> mistake: assuming that (a) security is the same everywhere, so what one firm does well, everyone should do the same, and (b) "financial institutions" have the best security, so if <strong>you</strong> want to have the "best security," you should do what they do.</p><p>Secondly, I don't get the point of including this fictional 20 years of experience in the prompt. Is that making a material difference? Why not tell it that it has a bazillion years of experience? Why not omit that? Do you want it threat modelling like we did "over 20 years ago" in 2002?</p><p>Third, this prompt will steer you toward threat models that are very wrong for some orgs. A non-profit, or an educational institution, or a low-stakes governmental agency (like parks &amp; rec) will have <em>very</em> different <a href="https://infosec.exchange/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatModeling</span></a> needs.</p><p>Lastly, the thing that all <a href="https://infosec.exchange/tags/ThreatModel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatModel</span></a> AI systems get wrong is they lack any notion of skepticism. Did the architecture diagram not make sense? Did they imply something exists but omit it from the description? Do some aspects of the documentation contradict each other? It never considers the possibility that any inputs are wrong or incomplete, either through ignorance or omission.</p><p>The advent of LLMs makes everyone think they can do expert-level work in fields where they have no expertise, all because they think they are the first person to try applying an LLM to problems in that domain.</p>
The New Oil<p>Digital <a href="https://mastodon.thenewoil.org/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatModeling</span></a> Under <a href="https://mastodon.thenewoil.org/tags/Authoritarianism" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Authoritarianism</span></a></p><p><a href="https://www.schneier.com/blog/archives/2025/09/digital-threat-modeling-under-authoritarianism.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">schneier.com/blog/archives/202</span><span class="invisible">5/09/digital-threat-modeling-under-authoritarianism.html</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/politics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>politics</span></a> <a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.thenewoil.org/tags/ThreatModel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatModel</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
morgandawn<p>Threat Model offers a free Covid safety list...</p><p>"Covid is airborne: it is in the exhaled breath of infected people. Vaccines and treatments are your last lines of defense. Post-infection immunity shortened to 28 days. 1 in 3 infected people are pre-symptomatic or show no symptoms. Long Covid usually comes from reinfections, most often “mild” infections. There is no limit to how many times you can catch Covid-19. The AMA wants people to know that getting reinfected is “akin to playing Russian Roulette.” Rapid tests can miss asymptomatic infections. "</p><p><a href="https://www.patreon.com/posts/huge-free-covid-86871700" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">patreon.com/posts/huge-free-co</span><span class="invisible">vid-86871700</span></a></p><p><a href="https://sfba.social/tags/ThreatModel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatModel</span></a> <a href="https://sfba.social/tags/covid" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>covid</span></a></p>
Lisi Hocke<p>Had a <a href="https://mastodon.social/tags/ThreatModel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatModel</span></a> session with two engineering teams today. A real extensive one, where preparation included a full review of what's already there. A tech stack we haven't touched on at this company yet. A model where I could really build on my past experience, and still felt I worked for way too long. And yet, it paid off. Had an insightful conversation with folks, we all learned from each other, and we paved the way for future small, lean modeling sessions. Huge win! 🎉 <a href="https://mastodon.social/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a> <a href="https://mastodon.social/tags/ProdSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProdSec</span></a></p>
Bi—zaar<p><a href="https://todon.eu/tags/FediHelp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FediHelp</span></a><br>I need to talk with someone skilled about <a href="https://todon.eu/tags/threatModel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatModel</span></a> (digital side) specifically about 'downloads' / archiving / wget (mirroring) and online/offline for field activities (logistics / investigation ) and activist groups (water, mud, soil investigation within sampling and DIY analysis &amp; data production)</p><p>I need to talk so do not point me any NGOs (I already now them). And I've been there too.</p><p>It's about holistic security approach in this very specific nudge.<br>Downloading things, offline access first, sharing (see Kiwix and kiwix itw at APC.org)<br>Being up to a mountain or down to a river or sewers system or so.<br>Or around floods in streets / towns / cities / lands.<br>Radio (SDR) scanning in the field and emergency data transmission / copy.</p><p>If it's not a clear and not understandable claim, I'm so sorry and please feel free to bake he with your asking and thoughts.</p><p>Very very important: carbon-mascu-male alpha-stupid-surviving-boyz are not welcome in this discussion and I'm sure you get the point my dear fedizens (no techbro / no cryptobro and more away)</p><p>cc <span class="h-card" translate="no"><a href="https://infosec.exchange/@DigiDefenders" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>DigiDefenders</span></a></span> <span class="h-card" translate="no"><a href="https://mstdn.social/@rysiek" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>rysiek</span></a></span> <span class="h-card" translate="no"><a href="https://chaos.social/@onepict" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>onepict</span></a></span> <br><span class="h-card" translate="no"><a href="https://mastodon.social/@APC" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>APC</span></a></span> <br><span class="h-card" translate="no"><a href="https://post.lurk.org/@iffybooks" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>iffybooks</span></a></span> <span class="h-card" translate="no"><a href="https://kolektiva.social/@hackstub" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>hackstub</span></a></span> <span class="h-card" translate="no"><a href="https://toot.aquilenet.fr/@lacontrevoie" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>lacontrevoie</span></a></span></p>
Sam Bent<p>Batman's threat model. <br>Be like Batman and make a threat model. <br><a href="https://mastodon.social/tags/threatmodel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatmodel</span></a></p>
kcarruthers<p>Time to update your threat models people: AI's the end of the Shell as we know it and I feel fine | <span class="h-card" translate="no"><a href="https://arvr.social/@mpesce" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>mpesce</span></a></span> is scaring us all </p><p><a href="https://infosec.exchange/tags/cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyber</span></a> <a href="https://infosec.exchange/tags/threatmodel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatmodel</span></a></p><p><a href="https://www.theregister.com/2025/06/11/opinion_column_mcp_von_neumann_machine/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/06/11/opi</span><span class="invisible">nion_column_mcp_von_neumann_machine/</span></a></p>
Paco Hope wishes ill for JK Rowling<p>Looking at some <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> generated <a href="https://infosec.exchange/tags/threatmodel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatmodel</span></a> output and it listed stealing a user's credentials and using them in the "Spoofing" category. I was uncertain. Is that spoofing or elevation of privilege. So I wander over to a <a href="https://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-threats" rel="nofollow noopener" target="_blank">#microsoft page on #stride</a>.</p><p>They say it's spoofing, which is fine. It's reasonable. I don't care as long as we all agree.</p><p>But in that table, that's literally <strong>the only example</strong> of spoofing. There are a LOT of other kinds of things that could be called spoofing. If you're gonna have only one example of spoofing, I don't think stealing credentials is the best example.</p>
Paco Hope wishes ill for JK Rowling<p>Lastly, there's the training data. I work for <a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AWS</span></a> (so these are strictly my personal opinions). We are opinionated about the platform. We think that there are things you should do and things you shouldn't. If you have deep knowledge of anything (Microsoft, Google, NodeJS, SAP, whatever) you will have informed opinions. </p><p>The threat models that I have seen, that use general purpose models like Claude Sonnet, include advice that I think is stupid because I am opinionated about the platform. There's training data about AWS in the model that was authored by not-AWS. And there's training data in the model that was authored by AWS. The former massively outweighs the latter in a general-purpose, trained-on-the-Internet model.</p><p>So internal users (who are expected to do things the AWS way) are getting threats that (a) don't match our way of working, and (b) they can't mitigate anyway. Like I saw an AI-generated threat of brute-forcing a cognito token. While the possiblity of that happening (much like buying a winning lottery ticket) is non-zero, that is not a threat that a software developer can mitigate. There's nothing you can do in your application stack to prevent, detect, or respond to that. You're accepting that risk, like it or not, and I think we're wasting brain cells and disk sectors thinking about it and writing it down.</p><p>The other one I hate is when it tells you to encrypt your data at rest in S3. Try not to. There's no action for you to take. The thing you control is which key does it and who can use that key.</p><p>So if you have an area of expertise, the majority of the training data in any consumer model is worse than your knowledge. It is going to generate threats and risks that will irritate you.</p><p>4/fin</p><p><a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a> <a href="https://infosec.exchange/tags/ThreatModel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatModel</span></a></p>
Paco Hope wishes ill for JK Rowling<p>I have seen a lot of efforts to use an <a href="https://infosec.exchange/tags/LLM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLM</span></a> to create a <a href="https://infosec.exchange/tags/ThreatModel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatModel</span></a>. I have some insights. </p><p>Attempts at <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/ThreatModeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatModeling</span></a> tend to do 3 things wrong:</p><ol><li>They assume that the user's input is both complete and correct. The LLM (in the implementations I've seen) never questions "are you sure?" and it never prompts the user like "you haven't told me X, what about X?"</li><li>Lots of teams treat a threat model as a deliverable. Like we go build our code, get ready to ship, and then "oh, shit! Security wants a threat model. Quick, go make one." So it's not this thing that informs any development choices <em>during development</em>. It's an afterthought that gets built just prior to <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a> review.</li><li>Lots of people think you can do an adequate threat model with only technical artifacts (code, architectuer, data flow, documentation, etc.). There's business context that needs to be part of every decision, and teams are just ignoring that.</li></ol><p>1/n</p>
Quixoticgeek<p>Fediverse. I need your magic. Please tell me your most amusing and wtf <a href="https://social.v.st/tags/ThreatModel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatModel</span></a> fails.</p>
Anti. 🐘COVID News Pandemic LongCOVID
Todd A. Jacobs | Pragmatic Cybersecurity<p><a href="https://infosec.exchange/tags/DuckDuckGo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DuckDuckGo</span></a> is now offering free, <a href="https://infosec.exchange/tags/anonymized" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>anonymized</span></a> access to a number of fast <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/chatbots" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chatbots</span></a> that won't train in your data. You currently don't get all the premium models and features of paid services, but you do get access to privacy-promoting, anonymized versions of smaller models like GPT-4o mini from <a href="https://infosec.exchange/tags/OpenAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenAI</span></a> and open-source <a href="https://infosec.exchange/tags/MoE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MoE</span></a> (mixture of experts) models like Mixstral 8x7B.</p><p>Of course, for truly sensitive or classified data you should never use online services at all. Anything online carries heightened risks of human error; deliberate malfeasance; corporate espionage; legal, illegal, or extra-legal warrants; and network wiretapping. I personally trust DuckDuckGo's no-logging policies and presume their anonymization techniques are sound, but those of us in <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> know the practical limitations of such measures.</p><p>For any situation where those measures are insufficient, you'll need to run your own instance of a suitable model on a local AI engine. However, that's not really the <a href="https://infosec.exchange/tags/threatmodel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatmodel</span></a> for the average user looking to get basic things done. Great use cases include finding quick answers that traditional search engines aren't good at, or performing common AI tasks like summarizing or improving textual information. </p><p>The AI service provides the typical user with essential AI capabilities for free. It also takes steps to prevent for-profit entities with privacy-damaging <a href="https://infosec.exchange/tags/TOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TOS</span></a> from training on your data at whim. DuckDuckGo's approach seems perfectly suited to these basic use cases.</p><p>I laud DuckDuckGo for their ongoing commitment to privacy, and for offering this valuable additional to the AI ecosystem.</p><p><a href="https://duckduckgo.com/chat" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">duckduckgo.com/chat</span><span class="invisible"></span></a></p>
Blobster<p><span class="h-card" translate="no"><a href="https://kind.social/@aleidk" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>aleidk</span></a></span> I replaced “mobile phone account“ with “mobile phone provider account” to be clearer about what I meant.</p><p>For banks (in the EU), AFAIK there is a strong reason why they never even mention FIDO2: for a transaction at least, the device where validation is performed must give basic info on the transaction: seller and amount.</p><p>Another point: the software support depends on site, browser (e.g., Firefox desktop != Firefox mobile), type of key, physical communication protocol (like USB vs. NFC). I made a lot of tests with various sites and my USB-A and USB-C keys, sometimes using NFC, other times USB. Some combinations don't work, or worked at some point and not later (or worked with Chrome but not Firefox, etc.). This can be quite stressful or even dangerous if this is for an important account and you have no backup plan (⇒ don't). And if the backup options are 1) exploitable in your threat model and 2) not very secure, this obviously reduces or nukes the advantage of using a security key in the first place.</p><p>A typical backup option which is not insecure from my POV if well handled is a set of recovery codes, but for this you need to store them very carefully, safely... and not forget how to access them in x years! In these conditions, setting up a new account requires “some work”.</p><p>And I say all this despite wishing FIDO2 great success, 'cause SIM swapping attacks in particular are quite scary given how much important stuff still depends on codes sent by SMS. 😐</p><p><a href="https://infosec.exchange/tags/FIDO2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FIDO2</span></a> <a href="https://infosec.exchange/tags/SecurityKeys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityKeys</span></a> <a href="https://infosec.exchange/tags/authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authentication</span></a> <a href="https://infosec.exchange/tags/threatModel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatModel</span></a></p>
boredsquirrel<p><span class="h-card" translate="no"><a href="https://social.heise.de/@ct_Magazin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ct_Magazin</span></a></span> </p><p>Threat Modelling ist hier extrem relevant.</p><p>Tails hat ein bestimmtes <a href="https://tux.social/tags/ThreatModel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatModel</span></a><br>- amnesic<br>- live<br>- incognito</p><p>Da ist kaum etwas mit Prozessisolierung, wie es <a href="https://tux.social/tags/Flatpak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Flatpak</span></a> und <a href="https://tux.social/tags/Bubblejail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bubblejail</span></a> tun, und <a href="https://tux.social/tags/QubesOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QubesOS</span></a> meistert</p><p>Und dass man damit auf einem beliebigen PC sicher sein kann ist leider auch ein falsches Versprechen. <a href="https://tux.social/tags/Coreboot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Coreboot</span></a> ist essentiell weil es minimal ist. Auf unterster Ebene sollte kaum Code laufen. Intel ME sollte aus sein. <a href="https://tux.social/tags/Heads" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Heads</span></a> ist auch wichtig.</p><p><span class="h-card" translate="no"><a href="https://fosstodon.org/@3mdeb" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>3mdeb</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.online/@novacustom" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>novacustom</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@tlaurion" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>tlaurion</span></a></span></p>
Areskul<p>- lock bios<br>- disable root account<br>- encrypt storages with luks2<br>- shutdown on unrecognized devices plugging (udev-rules)</p><p>Is there something more I can do to protect myself from an evil maid?</p><p><a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a><br><a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <br><a href="https://mastodon.social/tags/threatmodel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatmodel</span></a></p>
OWASP Foundation<p>Get ready for <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a> Days <a href="https://infosec.exchange/tags/Singapore" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Singapore</span></a>! 🎉 Interested in getting more engaged? Join us as a volunteer and help make this conference unforgettable! Check out our volunteer openings NOW: <a href="https://owasp.wufoo.com/forms/z7wfrfl07e63af/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">owasp.wufoo.com/forms/z7wfrfl0</span><span class="invisible">7e63af/</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/devsecops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devsecops</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/threatmodel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatmodel</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
OWASP Foundation<p>Excited about attending <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a> Days <a href="https://infosec.exchange/tags/Singapore" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Singapore</span></a>? Want to be more involved? Volunteer and support the event staff at this incredible conference! Explore our volunteer opportunities TODAY: <a href="https://owasp.wufoo.com/forms/z7wfrfl07e63af/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">owasp.wufoo.com/forms/z7wfrfl0</span><span class="invisible">7e63af/</span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/devsecops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devsecops</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/threatmodel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatmodel</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Adam Shostack :donor: :rebelverified:<p>Playing with phanpy.social, it seems that authorizing new apps to access mastodon doesn't require a two factor auth code.</p><p>While I haven't fully threat modeled it (you're already logged into the browser, so someone with browser access may not represent a shift in trust boundary, it feels off.</p><p><a href="https://infosec.exchange/tags/mastodon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mastodon</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/accidentalpentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>accidentalpentest</span></a> <a href="https://infosec.exchange/tags/sbd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sbd</span></a> <a href="https://infosec.exchange/tags/threatmodel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatmodel</span></a></p>
Dissent Doe :cupofcoffee:<p>Does your threat model include your employee's cat?</p><p><a href="https://www.theregister.com/2023/10/05/hospital_cat_incident/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2023/10/05/hos</span><span class="invisible">pital_cat_incident/</span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/wfh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wfh</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/riskassessment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>riskassessment</span></a> <a href="https://infosec.exchange/tags/threatmodel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatmodel</span></a></p>