What Threat Actors See: Managed Attribution Threat Modeling
My previous blog on threat modeling for managed attribution presented a basic framework for analyzing the MA solutions you might use to protect your online operations. In this post, I further analyze the kinds of information that could be visible to the various categories of threat actors.