Overview
Explore how threat modeling principles can be applied to online dating in this engaging conference talk from OWASP Global AppSec Tel Aviv. Discover best practices for balancing privacy and security concerns with the desire for human connection in the digital age. Learn about data flow diagrams, risk management, and attack trees through the lens of popular dating platforms like Tinder and OkCupid. Gain insights into practical strategies such as using Instagram, implementing fuzzy or delayed location sharing, and managing personal information disclosure. Suitable for both security professionals and individuals interested in safer online dating practices, this presentation offers a unique perspective on threat modeling that is both informative and entertaining.
Syllabus
Intro Summary
Who this talk is for
What youll learn
Why online dating
Why we do security
What happens when you dont threat modeling
Data Flow Diagrams
Stripe
Elevation of Privilege
Authentication
Checkmarks
Risk Management
Attack Trees
Managing Risk
Using Instagram
Fuzzy or Delay Location
Summary
Questions
Taught by
OWASP Foundation