Skip to main content

One doc tagged with "proportionality"

View all tags

Example: Low-Stakes BLE Sensor Threat Model

This document provides a third example of a threat model for a very simple, low-stakes consumer device: a battery-powered Bluetooth Low Energy (BLE) temperature and humidity sensor.