Security is not a binary state. It is a relationship between what you protect, who you protect it from, and what resources they command.

The Marmot Protocol's threat model does what every security document should: it names specific adversaries, details how the protocol defeats each one, and admits where cryptography alone cannot save you. This matters because matching a protocol's actual defenses to your actual situation is the difference between security and security theater. nostr:naddr1qqgrsvrp8p3xxetzxvmnqdtzxejnsq3qklkk3vrzme455yh9rl2jshq7rc8dpegj3ndf82c3ks2sk40dxt7qxpqqqp65w0wylh7

Reply to this note

Please Login to reply.

Discussion

i wish more people would understand threat models instead of screaming about the latest vpn their favorite influencer suggested

💐💐💐