Adam Shostack
Adam Shostack
It's easier to change the Makefile: -CFLAGS = $(MYDEFINEFLAGS) $(SUBDIRCFLAGS) +CFLAGS = $(MYDEFINEFLAGS) $(SUBDIRCFLAGS) -Wno-implicit-function-declaration However, I'm not sure how to ifdef that so it only happens on the mac,...
I think there's two threats here, and maybe split would be helpful. * bucket name "Fraser's list of social security numbers" * File names "bucket-22/list-of-ssns.xlsx"
This is a really fascinating issue, its very different from "An attacker can read data." Does it fall into the same sort of threat? Worth thinking about. Also, this phrase...
Scope is important -- I think adding monetary values to a TM is likely a bridge too far.
Attack trees are a representation of relationships between threats (and possibly mitigations and other stuff) and not a fundamental unit.
More generally, I think that a threat model may not be the thing you want to track in a BOM. I think what I want as a consumer is not...
Since this is still open, I'd like to encourage @objective-see to add an explanation of how to ensure the daemon is running to the dialog (probably through a link to...
I've removed the single instance of punctuation in the yaml. I think you've answered your other questions?
I'll note that your deck generator isn't including the intro/credits/how to play cards