I’ve been using one but I’m not sure what benefits I’m getting from it. I feel like the only thing happening is I’m adding a little bit of latency to all my requests for no reason.

  • 0x0@programming.dev
    link
    fedilink
    arrow-up
    0
    ·
    3 days ago

    You should consider your threat model first before using something without being unsure of the benefits.

    • TranquilTurbulence@lemmy.zip
      link
      fedilink
      arrow-up
      0
      ·
      edit-2
      3 days ago

      If you’ve never thought about threat models, here are some questions to get you started.

      1. List the assets that require protection. (Like credit card info)
      2. Who might want to gain access to those assets? (e.g. Hackers)
      3. How can you mitigate the risks? (Updates)

      You may have a lot to say, so write things down to clarify your thoughts. Once your threat model document is complete, it will be easier for you to figure it which tools you really need, and which ones are only nice to have.