1. Your assets
What do I have to protect?
Footage, transcripts, messages, contacts - all of these pieces of data make up the vast collection of your digital assets.Learn more
2. Your adversaries
Who am I concerned about?
Some adversaries are immediately obvious: a border agent, or a legal threat. Others may be less obvious, hidden from view or behind a screen a continent away.Learn more
3. Your adversaries’ capabilities
What are likely threats I might face over the course of this project?
The more information you’re able to gather about your adversary early on, the better you’ll be at anticipating their capabilities, and practically protecting your assets based on what you know.Learn more
4. Your capabilities
What can I do now to limit the negative impact of these threats?
At this point, you know who you’re concerned with, and have an idea of what these actors are capable of. In light of your concerns, how far can you go to protect the data you value?Learn more