When you do threat modeling, the danger is often lurking near the interfaces. It’s where different domains touch, where different security levels meet and where trust assumptions have to face reality – or the exploits of advanced attackers. This means […]