diff --git a/_includes/powered-by.html b/_includes/powered-by.html index 2dde2a4..8de506c 100644 --- a/_includes/powered-by.html +++ b/_includes/powered-by.html @@ -11,7 +11,7 @@
Distrust team helped build Turnkey, which leverages StageX, and AirgapOS to improve the security of their systems which help manage billions of dollars worth of value.
+Secured billions in digital assets by integrating StageX and AirgapOS into Turnkey's critical infrastructure, eliminating potential attack vectors.
Learn more → @@ -23,7 +23,7 @@The creators of the SUI cryptocurrency partner with Distrust for advice and use StageX to build their nodes in a deterministic manner in order to eliminate single points of failure.
+Eliminated single points of failure for Mysten Labs, creators of the SUI cryptocurrency, by securely integrating StageX into their deterministic nodes—protecting billions in transaction value.
Learn more → @@ -35,7 +35,7 @@Sidero labs has relied on Distrust for consulting and is using StageX to build their widely used Talos Linux distribution which delivers best in-class kubernetes features.
+Strengthened kubernetes deployments at Sidero Labs by leveraging StageX to secure their Talos Linux distribution—ensuring robust protection for critical cloud infrastructure.
Learn more → diff --git a/_includes/primary-cta.html b/_includes/primary-cta.html index 900fd67..4ce8fba 100644 --- a/_includes/primary-cta.html +++ b/_includes/primary-cta.html @@ -1,6 +1,6 @@We help organizations that can't afford to fail. If security is mission-critical for your company, let's talk.
+Let's talk. We help teams where security is mission-critical.
diff --git a/_layouts/company.html b/_layouts/company.html index 1894788..f421b82 100644 --- a/_layouts/company.html +++ b/_layouts/company.html @@ -24,7 +24,7 @@Too often, security is an afterthought—based on dogma, checklists, and outdated best practices. Distrust was founded to redefine security by developing new methods to eliminate single points of failure, and building systems in a manner where they don't need to be blindly trusted.
-We don’t just advise on security. We build it. We open-source it. And we teach organizations how to think critically about risk—because security isn’t about checking boxes. +
We don’t just advise on security. We build it. We open source it. And we teach organizations how to think critically about risk—because security isn’t about checking boxes.
Learn more diff --git a/_layouts/landing.html b/_layouts/landing.html index 033738d..b4a3fb5 100644 --- a/_layouts/landing.html +++ b/_layouts/landing.html @@ -17,7 +17,7 @@Distrust secures mission critical infrastructure by applying a first principles approach. No guessing, no shortcuts, only verifiable security.
+Distrust secures mission-critical infrastructure by applying a first principles approach. No guessing, only verifiable security.
We don’t just assess risks—we eliminate them. Our first principles approach removes single points of failure, protects mission-critical systems, and ensures verifiable security. Whether you need a full audit, architecture review, incident response, or ongoing retained support we have you covered.
+We don’t just assess risks—we eliminate them. Our consulting and implementation services remove single points of failure from your critical infrastructure through security audits, architecture reviews, and incident response.
Security is always evolving—so are we. Distrust is building the next generation of security infrastructure that eliminates reliance on any single computer, person, or system. Using full-source bootstrapping, determinism, and quorum-based security, we ensure verifiable, trustless protection at every layer.
+We build open source, verifiable security solutions designed for transparency and resilience. Our tooling protects every system layer—eliminating blind trust and ensuring security by design.
Built by engineers behind BitGo, Unit410, and Turnkey, we apply hard-earned lessons from securing critical infrastructure to build transparent, resilient, and universally applicable security solutions.
+Engineers behind BitGo, Unit410, and Turnkey—we apply lessons from securing critical infrastructure to build transparent, resilient, and universally applicable solutions.
@@ -32,46 +32,11 @@Benefit from our approach—a blend of proven methodologies and open source tooling we created, shaped by lessons from securing some of the world's highest-risk organizations.
-Eliminate root causes
-We don't just scan for bugs—we eliminate entire categories of bugs at the source using a first-principles methodology.
-Verifiable
-No guessing, no shortcuts. Every recommendation is backed by logic and rigor, not gut feel or just to check boxes.
-Proven track record
-Our security engineers have secured some of the highest risk infrastructure in the world (BitGo, Turnkey, Unit 410).
-Embedded collaborations
-We act as true partners— our goal is to make our clients succeed and not depend on us.
-Distrust offers high-impact security consulting and open-source tooling for companies that can't afford to fail. +
Distrust offers high-impact security consulting and open source tooling for companies that can't afford to fail.
Benefit from our approach—a blend of proven methodologies and open source tooling we created, shaped by lessons from securing some of the world's highest-risk organizations.
+Eliminate root causes
+We don't just scan for bugs—we eliminate entire categories of bugs at the source using a first-principles methodology.
+Verifiable
+No guessing, no shortcuts. Every recommendation is backed by logic and rigor, not gut feel or just to check boxes.
+Proven track record
+Our security engineers have secured some of the highest risk infrastructure in the world (BitGo, Turnkey, Unit 410).
+Embedded collaborations
+We act as true partners— our goal is to make our clients succeed and not depend on us.
+We help organizations that can't afford to fail. If security is mission-critical for your company, let's talk.
+Let's talk. We help teams where security is mission-critical.
diff --git a/_layouts/software.html b/_layouts/software.html index e3d39f6..5429b03 100644 --- a/_layouts/software.html +++ b/_layouts/software.html @@ -21,7 +21,7 @@Most systems still rely on single individuals or computers, unverifiable software, and opaque processes. We’re redesigning security for transparency from the ground up.
-Modern software systems still rely on trust in individuals—maintainers, IT admins, or third-party providers. But what happens when they are compromised? How do you verify that the software running on your systems hasn’t been tampered with?
-We’ve identified critical missing pieces needed to remove single points of failure at every level. Our approach covers the complete lifecycle of software from your toolchains and dependencies to how your code is built, signed, verified and deployed.
-By combining multi-party trust, remote attestation, and bit-for-bit reproducibility, we are methodically eliminating trust assumptions, ensuring security isn’t just a claim—it’s provable. And as everything we do, all our software is open source.
- - See what we're building - → - +Open source. Verifiable. Ready to use.
Open source. Verifiable. Ready to use.
+StageX
+Minimal, security-first Linux distribution for verifiable builds. Bootstrapped from Stage 0, it's hermetic, reproducible, and cryptographically multi-signed.
+AirgapOS
+Immutable Linux distribution for offline secret management. Diskless, reproducible, and hardened for air-gapped environments.
+Keyfork
+Deterministic key management toolchain—offline, air-gapped and smartcard-ready. Built for secure recovery, reproducibility, and cryptographic resilience.
+Icepick
+Framework for building offline-first cryptocurrency tools—supporting transfers, staking, and signing across Bitcoin, Ethereum, Solana, and more.
+Open source. Verifiable. Ready to use.
+
Secured billions in digital assets by integrating StageX and AirgapOS into Turnkey's critical infrastructure, eliminating potential attack vectors.
+ + Learn more + → + +Eliminated single points of failure for Mysten Labs, creators of the SUI cryptocurrency, by securely integrating StageX into their deterministic nodes—protecting billions in transaction value.
+ + Learn more + → + +Strengthened kubernetes deployments at Sidero Labs by leveraging StageX to secure their Talos Linux distribution—ensuring robust protection for critical cloud infrastructure.
+ + Learn more + → + +We are actively working on a number of different projects, and looking to fund others. Here is what's on the way and what's coming next.
+We're actively building some tools—and raising support to build others. Here's what's in-progress and what's coming next.
Modern software systems still rely on trust—maintainers, IT admins, third-party providers. But what happens when they are compromised? How do you verify that your systems haven't been tampered with?
+We’ve identified critical gaps and built tools to remove single points of failure across all levels of the software lifecycle—from toolchains and dependencies to how code is built, signed, verified and deployed.
+By combining multi-party trust, remote attestation, and bit-for-bit reproducibility, we are eliminating trust assumptions, ensuring security isn't just a claim—it's provable. And as everything we do, all our software is open source.
+ + See what we're building + → + +If you would like to help us, please sponsor our work or get involved as a contributor.
+Fund the work. Fork the code. Join the mission.
diff --git a/_sass/base.scss b/_sass/base.scss index 9ceb368..e511787 100644 --- a/_sass/base.scss +++ b/_sass/base.scss @@ -152,7 +152,7 @@ a:hover { border-radius: 20px; padding: 45px; margin: 20px; - min-height: 490px; + min-height: 420px; max-width: 550px; } @@ -566,6 +566,15 @@ a:hover { margin-top: 20px; } +.live-tools .properties .flex-container-inner { + border-top: 1px solid var(--light-purple); + margin-right: 40px; +} + +.live-tools svg { + margin-top: 20px; +} + @media only screen and (max-device-width: 500px) { * { font-size: $mobile-font-size;