What is a threat model?
Short answer
A threat model is a simple map of who might identify you, what data they can access, and which mistakes would expose you.
Last reviewed: 2026-02-20
threat-model
anonymity
basics
A threat model is a simple map of who might identify you, what data they can access, and which mistakes would expose you.
Why this matters
Without a threat model, people apply random tips. With one, you pick defenses that match real risk instead of maximum complexity.
Safe default steps
- Write down who you are worried about.
- List what they can realistically access (device logs, network logs, account history).
- Choose the minimum safe workflow that addresses those risks.
- Practice once with a non-sensitive file.
Common mistakes
- Copying advanced tactics without understanding tradeoffs.
- Ignoring local laws and organizational policies.
- Overlooking timing signals (when and where actions happened).
Limits
Threat models change. Re-check when your risk level, device, or channel changes.
Related
Next safe step: scrub a PDF locally and review threat model limits.