techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

5.4K
active users

#threatmodel

2 posts2 participants0 posts today

Some of my colleagues at #AWS have created an open-source serverless #AI assisted #threatmodel solution. You upload architecture diagrams to it, and it uses Claude Sonnet via Amazon Bedrock to analyze it.

I'm not too impressed with the threats it comes up with. But I am very impressed with the amount of typing it saves. Given nothing more than a picture and about 2 minutes of computation, it spits out a very good list of what is depicted in the diagram and the flows between them. To the extent that the diagram is accurate/well-labeled, this solution seems to do a very good job writing out what is depicted.

I deployed this "Threat Designer" app. Then I took the architecture image from this blog post and dropped that picture into it. The image analysis produced some of the list of things you see attached.

This is a specialized, context-aware kind of OCR. I was impressed at boundaries, flows, and assets pulled from a graphic. Could save a lot of typing time. I was not impressed with the threats it identifies. Having said that, it did identify a handful of things I hadn't thought of before, like EventBridge event injection. But the majority of the threats are low value.

I suspect this app is not cheap to run. So caveat deployor.
#cloud #cloudsecurity #appsec #threatmodeling

I don't feel good mentally, and most of that is because of my obsession with privacy and security.

I have never done any threat modeling, but instead wanted to hide everything, from everyone, all the time.

This is certainly not something I need, and it's very exhausting to try to live like that.

So now I have actually done threat modeling, and I hope and think, that this will easy my mind, and my life.

#Privacy #Security #Health #MentalHealth #ThreatModel #ThreatModeling #Serenity #PeaceOfMind

i have debilitating #imposterSyndrome 😆 25y experience in #security, but i know for a fact that i am unusually good at facilitating a #threatmodel. you have to get people to trust you enough to tell you things they don't feel great about or would do differently after we meet but that's the thing— together we create remediation plans that let people do their best work & they weave security and privacy into their work and when you meet again you can see how much better things are, it's parade time

Continued thread

it's lucky for some team out there that i find few things are as satisfying as transmogrifying a team of 3 into a team of 9. or 90 into 270.

even i know that's good math! they start spotting problems before they get in front of me for their second and third #threatmodel.

i have experience in managed services, vuln management, IR, forensics, cloud architectures, saas vendors, HPC, docsis/fiber/firewalls/ids/ips/MFA/u2f/pki🤷 🤓

that #seaArt site is starting to become a real problem. I'm seeing entirely too many prompts for Cute Things paired with age ranges and of you select the right lora or checkpoint it's very easy to generate a pile of images of all kinds including ones that would look a lot like Abuse Material and i know some legislatures have been adding laws about preventing that scenario and the irony of an AI self-policing itself is too much.

i wonder if they've been running a #threatmodel quarterly? 😬 #ai

#DuckDuckGo is now offering free, #anonymized access to a number of fast #AI #chatbots that won't train in your data. You currently don't get all the premium models and features of paid services, but you do get access to privacy-promoting, anonymized versions of smaller models like GPT-4o mini from #OpenAI and open-source #MoE (mixture of experts) models like Mixstral 8x7B.

Of course, for truly sensitive or classified data you should never use online services at all. Anything online carries heightened risks of human error; deliberate malfeasance; corporate espionage; legal, illegal, or extra-legal warrants; and network wiretapping. I personally trust DuckDuckGo's no-logging policies and presume their anonymization techniques are sound, but those of us in #cybersecurity know the practical limitations of such measures.

For any situation where those measures are insufficient, you'll need to run your own instance of a suitable model on a local AI engine. However, that's not really the #threatmodel for the average user looking to get basic things done. Great use cases include finding quick answers that traditional search engines aren't good at, or performing common AI tasks like summarizing or improving textual information.

The AI service provides the typical user with essential AI capabilities for free. It also takes steps to prevent for-profit entities with privacy-damaging #TOS from training on your data at whim. DuckDuckGo's approach seems perfectly suited to these basic use cases.

I laud DuckDuckGo for their ongoing commitment to privacy, and for offering this valuable additional to the AI ecosystem.

duckduckgo.com/chat

duckduckgo.comDuckDuckGo AI Chat at DuckDuckGoDuckDuckGo. Privacy, Simplified.
Replied in thread

@ct_Magazin

Threat Modelling ist hier extrem relevant.

Tails hat ein bestimmtes #ThreatModel
- amnesic
- live
- incognito

Da ist kaum etwas mit Prozessisolierung, wie es #Flatpak und #Bubblejail tun, und #QubesOS meistert

Und dass man damit auf einem beliebigen PC sicher sein kann ist leider auch ein falsches Versprechen. #Coreboot ist essentiell weil es minimal ist. Auf unterster Ebene sollte kaum Code laufen. Intel ME sollte aus sein. #Heads ist auch wichtig.

@3mdeb @novacustom @tlaurion

Fear and threat, conflict and surveillance have been mostly some of the key tenets of human economic activities since the beginning of the human civilization. The digital age has added large scale misinformation and bullshit which contributes to dehumanization. Anxiety, exhaustion, and emptiness have reduced our empathy and the ability to interact face to face. In the consumer space only those Internet dependent digital products which enables surveillance and dilutes the notion of privacy usually gain traction and often get accepted by the masses. Some of the reasons, for such a trend, may be as follows.

1. Perceived Better Security: Surveillance technologies are often marketed as tools to prevent crime, terrorism, and other threats to public safety.
2. Convenience and Efficiency: Facial recognition technology can be used for quick and seamless identification at airports or for unlocking smartphones.
3. Social Norms and Acceptance: When people see others accepting and using these technologies without significant backlash, they may feel more inclined to accept them as well. This leads to network effect where increased numbers of people or participants improve the value of a good or service.
4. Lack of Awareness and Understanding: Many users may not fully understand the extent of surveillance enabled by digital technologies or the potential negative consequences for decreased privacy.
5. Trade-Offs and Trade-Downs: In some cases, users may willingly trade privacy for other benefits, such as personalized services, targeted advertising, or access to certain platforms or services. Such approaches also gets influenced by the subconscious and loosely defined digital threat model of the individuals.

#Fear #Threat #Conflict #Surveillance #Dehumanization #Privacy #ThreatModel

Continued thread

maybe i should conduct a #threatmodel of #mentalHealth in #cybersecurity? i mean, burn-out is the obvious most-discussed challenge when you ask a search engine. but that's not unique, everyone has burnout concerns and challenges. but ADHD, anxiety, and the various iterations of depression and other mood disorders can paint us into corners before we even know it's happening.

most recently it took several months before i could see it myself that i was drifting backwards into places i won't go.

reclaimyour.tech/posts/technic

In this post, I describe #privacy #threatmodeling by using the excellent privacyguides.org site as a primary resource.

I give an example threat model with strengths and weaknesses. I encourage readers to tweak it to better suit their needs.

Reminder: Replies to this toot will appear in the link's comment section.

Reclaim Your TechPrivacy Threat ModelingA key responsibility involved in owning your own digital infrastructure is privacy threat modeling. What is Privacy Threat Modeling? According to priv…