Threat modeling is a key piece of this, but in the guide I don't call it threat modeling because I have found that the term can freak people out and make them less likely to engage. But yes - the process of understanding what you want to protect, and why, and making informed and prioritized decisions is key.
Intro blog post with Table of Contents available here: https://www.funnymonkey.com/2024/11/updates-to-the-personal-privacy-and-security-guide/
3/x
GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.
All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.