day nineteen

A tangible way to threat model?

Most privacy guides tell you to start implementing a privacy system by threat modelling. I've understood what it means in general, but the next question that arises is: how do I do this in a tangible way? Answering these questions is easy, but how does this help me make low-level, day-to-day decisions about the softwares I use and the actions I perform? This is what I've come up with:

Is there a more nitty-gritty or developed approach to doing this? Or is this kind of what I should go by?

Please answer at advait@fosstodon.org, or this Reddit thread...