- Message and operational repudiation
- Fraud, including account takeover
- Identity theft, including deepfakes and voice cloning
- Attacks on logs
- Repudiation in AI, machine learning, and blockchain
- Applying cryptographic defenses
Skill Level Intermediate
- It was like that when I got here. The check is in the mail. Repudiate means to revoke. To deny involvement in. It's a slightly different threat. One that often happens at a human layer. To claim something didn't happen or that you weren't responsible. Repudiation is nearly as old as speech, and as new as the latest hot app. This course is part of a series on threat modeling. And the stride pneumonic for threats. I'm Adam Shostack. I've written the most popular book on threat modeling, helped create the CVE, and I'm on the Black Hat Review Board. In this course you'll learn about threat modeling. A structured and systematic approach to finding security threats early in a project while there's still time to address them. Let's take a deep dive into repudiation and how to address it.