> _My point is that security people need to get their priorities straight._
>
> _The “threat model” section of a security paper resembles the script for a telenovela that was written by a paranoid schizophrenic: there are elaborate narratives and grand conspiracy theories, and there are heroes and villains with fantastic (yet oddly constrained) powers that necessitate a grinding battle of emotional and technical attrition._
>
> _In the real world, threat models are much simpler._
>
> _Basically, you’re either dealing with Mossad or not-Mossad._
>
> _If your adversary is not-Mossad, then you’ll probably be fine if you pick a good password and don’t respond to emails from `
[email protected]`._
>
> _If your adversary is the Mossad, YOU’RE GONNA DIE AND THERE’S NOTHING THAT YOU CAN DO ABOUT IT._
>
> _The Mossad is not intimidated by the fact that you employ https._
>
> _If the Mossad wants your data, they’re going to use a drone to replace your cellphone with a piece of uranium that’s shaped like a cellphone, and when you die of tumors filled with tumors, they’re going to hold a press conference and say “It wasn’t us” as they wear t-shirts that say “IT WAS DEFINITELY US,” and then they’re going to buy all of your stuff at your estate sale so that they can directly look at the photos of your vacation instead of reading your insipid emails about them._
>
> _In summary, https:// and two dollars will get you a bus ticket to nowhere._
>
> _Also, SANTA CLAUS ISN’T REAL. When it rains, it pours._
>
> -James Mickens, This World of Ours