• ono@lemmy.ca
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    1
    ·
    10 months ago

    Depends on the particulars, and on the needs of the individual.

    That’s not really how things like security works.

    If that were true, threat modeling wouldn’t exist. ;)

    I think some people just go crazy for something that’s not big tech, and then quit looking at the particulars.

    I expect that’s probably true. It’s safe to assume I’m not one of them, though. Cheers.

    • FutileRecipe@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      edit-2
      10 months ago

      If that were true, threat modeling wouldn’t exist.

      I feel like we’re talking about different things. I’m talking about static concepts, if X is more secure than Y, not individual setups where something is tweaked. Threat modeling is tailoring the security to your needs. It doesn’t bend security of a static object or make the application of something less than what it is. It requires one’s actions to do that by not utilizing it.

      Take bullet proof glass, for example. Bullet proof glass is more secure than regular glass. Now, do you need (does your threat model require) bullet proof glass? No? Ok, that doesn’t mean bullet proof is now less secure than regular glass, it’s just unneeded.