From 341cae4520898db8fa2c5dedc1317258c34652ee Mon Sep 17 00:00:00 2001 From: Zola Gonano Date: Thu, 16 May 2024 16:55:19 +0000 Subject: [PATCH] Add title for chapter 2's ending --- src/chapter_2.md | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/src/chapter_2.md b/src/chapter_2.md index eb1ef08..051ab33 100644 --- a/src/chapter_2.md +++ b/src/chapter_2.md @@ -147,9 +147,7 @@ Sometimes you need privacy and security to avoid censorship, whether it's applie In this scenario, privacy tools like VPNs, proxies, encrypted DNS, and Tor can help you bypass censorship. Privacy-friendly platforms like Mastodon, which allow you to host them yourself, enable you to freely express your thoughts without someone like Elon Musk getting mad at you. - - ---- +## The journey begins... These were some of the common threats and common ways to design your threat model based on. It can vary based on your very unique situation; you need to address your own personal needs when it comes to threat modeling. But it's not something you should skip; otherwise, you would be lost, wasting time and energy on things you don't need. That's how I started my privacy journey—I didn't design a threat model. Instead, I tried to make myself bulletproof from every possible attack and ended up wasting a year of my life. I also gave myself long-lasting anxiety and paranoia for no reason, all because I didn't plan out who I'm protecting my data from.