Comment by ygjb
6 months ago
Sigh. You don't prune threats you can't control from a threat model, you document them so that the consumers and maintainers of the target of assessment can intelligently reason about the threats as the product evolves.
No comments yet
Contribute on Hacker News ↗