Threat Modeling Password Managers
Adam Shostack
JANUARY 2, 2025
Here's my model of what we're working on: Let me walk you through this: There's a password manager, which talks to a website. The two boundaries displayed are where the data and the "password manager.exe" live. Similarly, the passwords are stored somewhere, and there's a boundary around that. What can go wrong?
Let's personalize your content