Steganography API at your service. (upd)

API

Steganography is the art and science of embedding secret messages in a cover message so that no one, apart from the sender and intended recipient, suspects the existence of the message.  The most common example is to hide a message in an image file without compromising how the image looks. Most people use the photos … Read more

My Threat Modeling book is available in 12 networks and supports the Fedora Project.

A screen from the e-shop that sells the threat modeling e-book

I started distributing my little e-book to the world a few weeks ago. Now I am sharing that it’s available on at least 12 websites that you probably use, including Barnes and Noble, Google Play, Apple Books, and the Kindle store. If you are curious about the Threat Modeling topic, here is what this book … Read more

A convenient guide to starting you on Threat Modeling – part one

Thread Modeling: Part of a session

Per Wikipedia, the core definition of threat modeling is “A process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified, enumerated, and mitigations can be prioritized.” Suppose we want to get practical and decode this into something everyone can understand. In that case, it’s answering four simple … Read more