Skip to content

Cover

How do I start? ​

This will look different for you depending on what it is you are trying to protect, how you want to do it, and how much you are willing to do to protect yourself. Achieving a good balance between privacy, security, and usability can be quite challenging. Many people get overwhelmed by what there is to know and do - but remember, every small step counts. It's a journey, not a sprint.

Creating Your Threat Model ​

When building a plan, you should answer these five questions:

  1. What do I want to protect?
  2. Who do I want to protect it from?
  3. How bad are the consequences if I fail?
  4. How likely is it that I will need to protect it?
  5. How much trouble am I willing to go through to try to prevent potential consequences?

Try it yourself ​

What does a security plan look like? Let’s say you want to keep your house and possessions safe. Here are a few questions you might ask, using some keywords like “assets” and “adversaries” that will come up again later:

What do I have inside my home that is worth protecting?

  • Assets could include: jewelry, electronics, financial documents, passports, or photos

Who do I want to protect it from?

  • Adversaries could include: burglars, roommates, or guests

How likely is it that I will need to protect it?

  • Does my neighborhood have a history of burglaries? How trustworthy are my roommates/guests? What are the capabilities of my adversaries? What are the risks I should consider?

How bad are the consequences if I fail?

  • Do I have anything in my house that I cannot replace? Do I have the time or money to replace these things? Do I have insurance that covers goods stolen from my home? Are there other people in my life whose security will be compromised if these threats occur?

How much trouble am I willing to go through to prevent these consequences?

  • Am I willing to buy a safe for sensitive documents? Can I afford to buy a high-quality lock? Do I have time to open a security box at my local bank and keep my valuables there?

Once you have asked yourself these questions, you are in a position to assess what measures to take. If your possessions are valuable, but the probability of a break-in is low, then you may not want to invest too much money in a lock. But, if the probability of a break-in is high, you’ll want to get the best lock on the market, and consider adding a security system.

You may already begin to sense that there is no definitive answer to these questions. Rather, you have to make judgments based on what you value and the likelihood that some threat could come to pass. That is the essence of this exercise; making educated decisions based on measuring severity of impact of threats, likelihood of them occurring, and prioritizing what things you want to protect.


What do I want to protect? ​

An “asset” is something you value and want to protect. In the context of digital security, an asset is usually some kind of information. For example it could be your emails, contact lists, direct messages, location, or other documents. Your devices themselves may also be assets.

Make a list of your assets: data that you keep, where it’s kept, who has access to it, and what stops others from accessing it.

Who do I want to protect it from? ​

To answer this question, it’s important to identify who might want to target you or your information. A person or entity that poses a threat to your assets is an “adversary”. Examples of potential adversaries are your boss, law enforcement, your former partner, your business competition, your government, or a hacker on a public network. It could even include people you would otherwise trust who might accidentally compromise your assets by being careless with their own security plans.

Make a list of potential or known adversaries, or those who might want to get ahold of your assets. Your list may include individuals, a government agency, or corporations. Depending on who your adversaries are, under some circumstances this list might be something you want to destroy after you’re done security planning.

How bad are the consequences if I fail? ​

There are many ways an adversary could gain access to your data. For example, an adversary could get you to click on a malicious link sent to your email address that compromises your computer. Or more simply, it could be someone screenshotting your private DM’s and using that information against you.

The motives of adversaries differ widely, as do their tactics. Some might be highly technically sophisticated, while others are more like scams made to gain your trust and ultimately betray it.

Security planning involves understanding how bad the consequences could be if an adversary successfully gains access to one of your assets. To determine this, you should consider the capability of your adversary. For example, your mobile phone provider has access to all your phone records. Your government might have stronger capabilities.

Write down what your adversary might want to do with your private data.

How likely is it that I will need to protect it? ​

Risk is the likelihood that a particular threat against a particular asset will actually occur. It goes hand-in-hand with capability. For example, while your mobile phone provider has the capability to access all of your data, the risk of them posting your private data online to harm your reputation is low.

It is important to distinguish between what might happen and the probability it may happen. For instance, there is a threat that your building might collapse, but the risk of this happening is far greater in San Francisco (where earthquakes are common) than in Stockholm (where they are not).

Assessing risks is both a personal and a subjective process. Many people find certain threats unacceptable no matter the likelihood they will occur because the mere presence of the threat at any likelihood is not worth the cost. In other cases, people disregard high risks because they don’t view the threat as a problem.

Write down which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about.

How much trouble am I willing to go through to try to prevent potential consequences? ​

There is no perfect option for security. Not everyone has the same priorities, concerns, or access to resources. Your risk assessment will allow you to plan the right strategy for you, balancing convenience, cost, and privacy.

For example, an attorney representing a client in a national security case may be willing to go to greater lengths to protect communications about that case, such as using encrypted email, than a family member who regularly emails funny cat videos.

Write down what options you have available to you to help mitigate your unique threats. Note if you have any financial constraints, technical constraints, or social constraints.

Common Goals and Threats ​

Anonymity - Shielding your online activity from your real identity, protecting you from people who are trying to uncover your identity specifically.
Mass Surveillance - Protection from government agencies, organizations, websites, and services which work together to track your activities.
Targeted Attacks - Being protected from hackers or other malicious actors who are trying to gain access to your data or devices specifically.
Identity Theft - Preventing unauthorized use of your personal information for fraudulent purposes, such as opening accounts or making purchases in your name.
Passive Attacks - Being protected from things like malware, data breaches, and other attacks that are made against many people at once.
Service Providers - Protecting your data from service providers (e.g. with E2EE, which renders your data unreadable to the server).
Surveillance Capitalism - Protecting yourself from big advertising networks, like Google and Facebook, as well as a myriad of other third-party data collectors.
Censorship - Avoiding censored access to information or being censored yourself when speaking online.
Education - Promoting awareness among individuals about common threats, best practices, and tools available to enhance online security and privacy.

Creating a security plan will assist you in identifying the specific threats that apply to you and in assessing your resources, your adversaries, and their capabilities, along with the likelihood of the risks you are exposed to occurring.

Sources ​