1. Introduction
  2. Must read
    1. Threat Model
    2. At a high level
    3. Hardware security keys
    4. Multi-factor authentication
    5. Cryptographic wallets
    6. Phishing attacks
    7. Work devices
      1. Software updates
  3. For developers
    1. SSH keys
    2. Sharing Secrets
  4. For administrators
    1. Separate admin accounts
    2. GitHub hardening
    3. Email hardening
  5. Physical security
    1. Traveling
  6. Contacts