1. Introduction
  2. Must read
    1. Threat Model
    2. At a high level
    3. Hardware security keys
    4. Multi-factor authentication
    5. Cryptographic wallets
    6. Work devices
      1. Software updates
  3. For developers
    1. SSH keys
  4. For administrators
    1. Separate admin accounts
    2. GitHub hardening
    3. Email hardening
  5. Physical security
    1. Traveling
  6. Contacts