(14/N) Having familiarized ourselves with categories of adversaries, their main goals and their respective, overall "modus operandi", let's look at the types of threats posed by them.
Again, it pays to focus on types of threats: We don't want to become mainly alert-triggered, but proactive. There are several frameworks we can borrow ideas from, most notably the LINDDUN framework that is geared toward threats to privacy, and can be extended a bit to cover more ground.
First, our list of threat types:
Our definitions of these, for our context:
Linking
An adversary can figure out connections and relationships between formerly isolated items of interest.
Identifiying
An adversary can link items of interest directly to a natural person.
(to be continued)
Start of this thread:
https://mastodon.de/@tuxwise/113503228291818865
LINDDUN:
https://linddun.org/