Part three of a series on service-to-service user-data portability architectures and how we can do threat modeling against the generic architecture. While exploring access control, harmful content and spoofing, many details turn out to be use-case dependent and the threat model must be considered again when we implement specific solutions. Hopefully this is a useful map of the threat territory.| Data Transfer Initiative
Over on Threads I had an exchange about targeted ads: are they better than generic ads? Is ad tracking really bad? I see some real, relevant and big implications of behavioral tracking and targeted…| The Waving Cat