Today’s blog post is a very old one that has been sitting in my Drafts folder, and it was partly inspired by the idea of threat modeling. Figured it would be a good idea to dust it off and post it, because why not?
Sort of like “thinking out of the box” type of articles.
Couldn’t remember whether it was something I wrote while I was attending a security conference? From the sound of that, it was obviously more than a year ago.
Decided to keep most of it in its very raw form and made minimal changes, largely to correct typo errors etc.
I suppose the topic regarding the transfer of CPF-OA to CPF-SA has been discussed to death. Rather than dwell on the specifics any further, why not let me poke around the topic instead of looking at it as a mathematical question.
History
From Wikipedia, it states that...