Overview
This course aims to help individuals understand the security implications of online dating by applying threat modeling principles. The learning outcomes include establishing safer online dating practices based on one's threat model. The course covers skills such as creating Data Flow Diagrams, conducting Risk Management, using tools like Stripe and Checkmarks, and developing Attack Trees. The teaching method involves a talk by a Red Teamer who shares personal experiences and best practices. The intended audience includes individuals seeking to balance privacy, security, and human connection in the realm of online dating.
Syllabus
Intro Summary
Who this talk is for
What youll learn
Why online dating
Why we do security
What happens when you dont threat modeling
Data Flow Diagrams
Stripe
Elevation of Privilege
Authentication
Checkmarks
Risk Management
Attack Trees
Managing Risk
Using Instagram
Fuzzy or Delay Location
Summary
Questions
Taught by
OWASP Foundation