• 0 Posts
  • 12 Comments
Joined 7 months ago
cake
Cake day: August 1st, 2025

help-circle

  • Informally, I phrase it like:

    • WHAT do you want to protect? (e.g. money, personal info, business data, specific items/resources, etc.)
    • WHO do you need to protect it from? (e.g. online scammers/criminals, business competitors, an enemy government, etc.)

    Consultants come up with more formal approaches for their corporate clients, but the above is usually enough for your average person. Then they can start reading the technical information looking for answers to the questions: “HOW might the threat actors get to my assets?” and “HOW can I protect those assets?”


  • The very weird behaviour of most characters was special.

    Yes, to expand on this: each of the characters had enough “story” to make a movie of their own, and there were a lot of characters. But it was paced well enough that it didn’t get overwhelming.

    Also the casting was very well done. At the time Travolta was a bit of a has-been, and Samuel L Jackson was getting supporting roles but wasn’t as iconic as he is now.

    The movie was very influential, so a lot of the innovations it made have been copied, so it seems more “normal” now.