Understanding the Threat ModelCredential Storage Options: A Deep DiveData Minimization & Privacy-Enhancing TechnologiesHow Didit HelpsReady to Get Started?