Главная
Study mode:
on
1
Intro Summary
2
Who this talk is for
3
What youll learn
4
Why online dating
5
Why we do security
6
What happens when you dont threat modeling
7
Data Flow Diagrams
8
Stripe
9
Elevation of Privilege
10
Authentication
11
Checkmarks
12
Risk Management
13
Attack Trees
14
Managing Risk
15
Using Instagram
16
Fuzzy or Delay Location
17
Summary
18
Questions
Description:
Explore how threat modeling principles can be applied to online dating in this engaging conference talk from OWASP Global AppSec Tel Aviv. Discover best practices for balancing privacy and security concerns with the desire for human connection in the digital age. Learn about data flow diagrams, risk management, and attack trees through the lens of popular dating platforms like Tinder and OkCupid. Gain insights into practical strategies such as using Instagram, implementing fuzzy or delayed location sharing, and managing personal information disclosure. Suitable for both security professionals and individuals interested in safer online dating practices, this presentation offers a unique perspective on threat modeling that is both informative and entertaining.

How Online Dating Made Me Better at Threat Modeling

OWASP Foundation
Add to list
0:00 / 0:00