Thread model

Your software will not be perfectly safe, but it should be safe enough. Not that you must know what you consider “safe enough”

External constraints

Case Study 1: To HTTPS or not to HTTPS?

Case Study 2: Managing Passwords