diff --git a/_includes/powered-by.html b/_includes/powered-by.html index 2dde2a4..8de506c 100644 --- a/_includes/powered-by.html +++ b/_includes/powered-by.html @@ -11,7 +11,7 @@
-

Distrust team helped build Turnkey, which leverages StageX, and AirgapOS to improve the security of their systems which help manage billions of dollars worth of value.

+

Secured billions in digital assets by integrating StageX and AirgapOS into Turnkey's critical infrastructure, eliminating potential attack vectors.

Learn more @@ -23,7 +23,7 @@
-

The creators of the SUI cryptocurrency partner with Distrust for advice and use StageX to build their nodes in a deterministic manner in order to eliminate single points of failure.

+

Eliminated single points of failure for Mysten Labs, creators of the SUI cryptocurrency, by securely integrating StageX into their deterministic nodes—protecting billions in transaction value.

Learn more @@ -35,7 +35,7 @@
-

Sidero labs has relied on Distrust for consulting and is using StageX to build their widely used Talos Linux distribution which delivers best in-class kubernetes features.

+

Strengthened kubernetes deployments at Sidero Labs by leveraging StageX to secure their Talos Linux distribution—ensuring robust protection for critical cloud infrastructure.

Learn more diff --git a/_includes/primary-cta.html b/_includes/primary-cta.html index 900fd67..4ce8fba 100644 --- a/_includes/primary-cta.html +++ b/_includes/primary-cta.html @@ -1,6 +1,6 @@
-

ready to take your security to the next level?

-

We help organizations that can't afford to fail. If security is mission-critical for your company, let's talk.

+

can't afford a breach?

+

Let's talk. We help teams where security is mission-critical.

Work with us
diff --git a/_layouts/company.html b/_layouts/company.html index 1894788..f421b82 100644 --- a/_layouts/company.html +++ b/_layouts/company.html @@ -24,7 +24,7 @@

Too often, security is an afterthought—based on dogma, checklists, and outdated best practices. Distrust was founded to redefine security by developing new methods to eliminate single points of failure, and building systems in a manner where they don't need to be blindly trusted.

-

We don’t just advise on security. We build it. We open-source it. And we teach organizations how to think critically about risk—because security isn’t about checking boxes. +

We don’t just advise on security. We build it. We open source it. And we teach organizations how to think critically about risk—because security isn’t about checking boxes.

Learn more diff --git a/_layouts/landing.html b/_layouts/landing.html index 033738d..b4a3fb5 100644 --- a/_layouts/landing.html +++ b/_layouts/landing.html @@ -17,7 +17,7 @@

security without blind trust

-

Distrust secures mission critical infrastructure by applying a first principles approach. No guessing, no shortcuts, only verifiable security.

+

Distrust secures mission-critical infrastructure by applying a first principles approach. No guessing, only verifiable security.


Work with us
@@ -42,9 +42,9 @@

services

-

We don’t just assess risks—we eliminate them. Our first principles approach removes single points of failure, protects mission-critical systems, and ensures verifiable security. Whether you need a full audit, architecture review, incident response, or ongoing retained support we have you covered.

+

We don’t just assess risks—we eliminate them. Our consulting and implementation services remove single points of failure from your critical infrastructure through security audits, architecture reviews, and incident response.


- Learn more + Explore our methodology
@@ -53,7 +53,7 @@

software

-

Security is always evolving—so are we. Distrust is building the next generation of security infrastructure that eliminates reliance on any single computer, person, or system. Using full-source bootstrapping, determinism, and quorum-based security, we ensure verifiable, trustless protection at every layer.

+

We build open source, verifiable security solutions designed for transparency and resilience. Our tooling protects every system layer—eliminating blind trust and ensuring security by design.


View software @@ -63,6 +63,8 @@
+ + {% include powered-by.html %} {% include values.html %} diff --git a/_layouts/services.html b/_layouts/services.html index 3f1efae..9b99d3a 100644 --- a/_layouts/services.html +++ b/_layouts/services.html @@ -21,10 +21,10 @@

- hire Distrust to solve your hardest security challenges + solve your hardest security challenges


-

Built by engineers behind BitGo, Unit410, and Turnkey, we apply hard-earned lessons from securing critical infrastructure to build transparent, resilient, and universally applicable security solutions.

+

Engineers behind BitGo, Unit410, and Turnkey—we apply lessons from securing critical infrastructure to build transparent, resilient, and universally applicable solutions.

Work with us
@@ -32,46 +32,11 @@ - {% include companies-carousel.html hide_title='true' %} - -
-
-
-

why choose Distrust

-

Benefit from our approach—a blend of proven methodologies and open source tooling we created, shaped by lessons from securing some of the world's highest-risk organizations.

-
-
-
-
-
-
-
- -

Eliminate root causes

-

We don't just scan for bugs—we eliminate entire categories of bugs at the source using a first-principles methodology.

-
-
- -

Verifiable

-

No guessing, no shortcuts. Every recommendation is backed by logic and rigor, not gut feel or just to check boxes.

-
-
- -

Proven track record

-

Our security engineers have secured some of the highest risk infrastructure in the world (BitGo, Turnkey, Unit 410).

-
-
- -

Embedded collaborations

-

We act as true partners— our goal is to make our clients succeed and not depend on us.

-
-
-

our services

-

Distrust offers high-impact security consulting and open-source tooling for companies that can't afford to fail. +

Distrust offers high-impact security consulting and open source tooling for companies that can't afford to fail.

@@ -109,6 +74,43 @@
+ {% include companies-carousel.html %} + +
+
+
+

why choose Distrust

+

Benefit from our approach—a blend of proven methodologies and open source tooling we created, shaped by lessons from securing some of the world's highest-risk organizations.

+
+
+
+
+
+
+
+ +

Eliminate root causes

+

We don't just scan for bugs—we eliminate entire categories of bugs at the source using a first-principles methodology.

+
+
+ +

Verifiable

+

No guessing, no shortcuts. Every recommendation is backed by logic and rigor, not gut feel or just to check boxes.

+
+
+ +

Proven track record

+

Our security engineers have secured some of the highest risk infrastructure in the world (BitGo, Turnkey, Unit 410).

+
+
+ +

Embedded collaborations

+

We act as true partners— our goal is to make our clients succeed and not depend on us.

+
+
+
+ +
+
-

ready to take your security to the next level?

-

We help organizations that can't afford to fail. If security is mission-critical for your company, let's talk.

+

can't afford a breach?

+

Let's talk. We help teams where security is mission-critical.

Work with us
diff --git a/_layouts/software.html b/_layouts/software.html index e3d39f6..5429b03 100644 --- a/_layouts/software.html +++ b/_layouts/software.html @@ -21,7 +21,7 @@
software

-

verifiable security without single points of failure

+

open source tools for verifiable security


Most systems still rely on single individuals or computers, unverifiable software, and opaque processes. We’re redesigning security for transparency from the ground up.

@@ -31,25 +31,102 @@
-
-
-

creating the building blocks for provable security

-

Modern software systems still rely on trust in individuals—maintainers, IT admins, or third-party providers. But what happens when they are compromised? How do you verify that the software running on your systems hasn’t been tampered with?

-

We’ve identified critical missing pieces needed to remove single points of failure at every level. Our approach covers the complete lifecycle of software from your toolchains and dependencies to how your code is built, signed, verified and deployed.

-

By combining multi-party trust, remote attestation, and bit-for-bit reproducibility, we are methodically eliminating trust assumptions, ensuring security isn’t just a claim—it’s provable. And as everything we do, all our software is open source.

- - See what we're building - - +
+
+

live tools

+

Open source. Verifiable. Ready to use.

-
- {% include powered-by.html %} + + +
+
+

live tools

+

Open source. Verifiable. Ready to use.

+
+
+
+
+
+
+
+
+
+
+

StageX

+

Minimal, security-first Linux distribution for verifiable builds. Bootstrapped from Stage 0, it's hermetic, reproducible, and cryptographically multi-signed.

+
+
+

AirgapOS

+

Immutable Linux distribution for offline secret management. Diskless, reproducible, and hardened for air-gapped environments.

+
+
+

Keyfork

+

Deterministic key management toolchain—offline, air-gapped and smartcard-ready. Built for secure recovery, reproducibility, and cryptographic resilience.

+
+
+

Icepick

+

Framework for building offline-first cryptocurrency tools—supporting transfers, staking, and signing across Bitcoin, Ethereum, Solana, and more.

+
+
+
+ + + + + +
+
+

live tools

+

Open source. Verifiable. Ready to use.

+

+
+ +
+
+
+
+ +
+

Secured billions in digital assets by integrating StageX and AirgapOS into Turnkey's critical infrastructure, eliminating potential attack vectors.

+ + Learn more + + +
+
+
+
+
+ +
+

Eliminated single points of failure for Mysten Labs, creators of the SUI cryptocurrency, by securely integrating StageX into their deterministic nodes—protecting billions in transaction value.

+ + Learn more + + +
+
+
+
+
+ +
+

Strengthened kubernetes deployments at Sidero Labs by leveraging StageX to secure their Talos Linux distribution—ensuring robust protection for critical cloud infrastructure.

+ + Learn more + + +
+
+
+ +
-

our software

-

We are actively working on a number of different projects, and looking to fund others. Here is what's on the way and what's coming next.

+

our roadmap

+

We're actively building some tools—and raising support to build others. Here's what's in-progress and what's coming next.

@@ -144,16 +221,33 @@
+ {% include powered-by.html %} + +
+
+

building the missing pieces for provable security

+

Modern software systems still rely on trust—maintainers, IT admins, third-party providers. But what happens when they are compromised? How do you verify that your systems haven't been tampered with?

+

We’ve identified critical gaps and built tools to remove single points of failure across all levels of the software lifecycle—from toolchains and dependencies to how code is built, signed, verified and deployed.

+

By combining multi-party trust, remote attestation, and bit-for-bit reproducibility, we are eliminating trust assumptions, ensuring security isn't just a claim—it's provable. And as everything we do, all our software is open source.

+ + See what we're building + + +
+
+
+ +
-

❝Our mission is to use our knowledge to improve the security, privacy, and freedom of as many individuals as possible. We believe having verifiable foundations on which technologies can be built is a fundamental step toward improving the wellbeing of our species and solving the coordination problem.❝ — Distrust team

+

❝You can't build a better world on unverifiable systems. We eliminate single points of failure by rethinking security from first principles, and open sourcing everything we build.❝ — Distrust team

want to help with our vision?

-

If you would like to help us, please sponsor our work or get involved as a contributor.

+

Fund the work. Fork the code. Join the mission.

diff --git a/_sass/base.scss b/_sass/base.scss index 9ceb368..e511787 100644 --- a/_sass/base.scss +++ b/_sass/base.scss @@ -152,7 +152,7 @@ a:hover { border-radius: 20px; padding: 45px; margin: 20px; - min-height: 490px; + min-height: 420px; max-width: 550px; } @@ -566,6 +566,15 @@ a:hover { margin-top: 20px; } +.live-tools .properties .flex-container-inner { + border-top: 1px solid var(--light-purple); + margin-right: 40px; +} + +.live-tools svg { + margin-top: 20px; +} + @media only screen and (max-device-width: 500px) { * { font-size: $mobile-font-size;