Creation of a realistic threat model is a necessary part of any “secure” software development endeavor. And although one can use a number of different security methodologies to create such a model, sometimes it is enough to draw analogies between potential threat actors and small children or pets. Although it may sound strange, this can really teach us most of what we need to know about modeling threats… as we will show in this talk.