I need help thinking about something.
For a while I've been wanting to create some sort of guide about tech security and threat modelling.
Specifically, I want to correlate the layers of technology we use with the "layers" of bad actors and their ease with which they can exploit your technology.
e.g. local PD probably can't decrypt your hard drive, but they can see your FB posts.