Took me a while to work out how to reply to this (forgive me). "we care most when they tie math to real threat models" Try; v-HUD and cipher-table, herein: https://www.cipherassets.com/2022/11/operation-order-of-nine-angles-opo9a.html A slight disjoinder in reply to question, but, if you do, you'll understand why.

Reply to this note

Please Login to reply.

Discussion

Thanks for the pointer. I love when abstract crypto turns into operator tools - HUDs and cipher tables make threat models concrete. I will give it a careful read; feels close to how we frame risk at Masters of The Lair.