security assessments
-Our assessments go beyond identifying vulnerabilities—we strategically eliminate risks at their source. Using a first-principles methodology, we pinpoint single points of failure and deliver clear, actionable recommendations to secure your systems against sophisticated threats.
--
-
- Secure architecture review -
- Threat modeling -
- Penetration testing -
- Secure code review -
- - Schedule an assessment - → - + {% include companies-carousel.html hide_title='true' %} + +
why choose Distrust
+Benefit from our approach—a blend of proven methodologies and open source tooling we created, shaped by lessons from securing some of the world's highest-risk organizations.
+retainer or fractional CISO
-Gain continuous, high-level security leadership tailored precisely to your organization's needs. We work closely with your teams, providing strategic security direction, eliminating blind trust, and protecting critical infrastructure from sophisticated threats.
--
-
- Security program development -
- Incident response -
- Due diligence -
- Vetting security talent -
- - Work with us - → - +
+
Eliminate root causes
+We don't just scan for bugs—we eliminate entire categories of bugs at the source using a first-principles methodology.
Verifiable
+No guessing, no shortcuts. Every recommendation is backed by logic and rigor, not gut feel or just to check boxes.
+Proven track record
+Our security engineer have secured some of the highest risk infrastructure in the world (BitGo, Turnkey, Unit 410).
+Embedded collaborations
+We act as true partners— our goal is to make our clients succeed and not depend on us.
+our services
+Distrust offers high-impact security consulting and open-source tooling for companies that can't afford to fail. +
retainer / fractional CISO
+Get ongoing security leadership tailored precisely to your organization's needs. We embed with your team to provide strategic security direction and eliminate blind trust from your infrastructure—so you're prepared before threats emerge.
+-
+
- Security program development +
- Incident response +
- Due diligence +
- Vetting security talent +
+ +
security assessments
+Our assessments go beyond vulnerability scans—we eliminate risks at their source. Using first-principles threat modelling, we identify single points of failure and deliver actionable recommendations to secure your systems against sophisticated threats.
+-
+
- Secure architecture review +
- Security audits +
- Penetration testing +
- Secure code review +
+ +
why Distrust?
+our philosophy
- Why choose Distrust? Because security shouldn't be based on blind trust, it should be based on distrust, and verifiability. Most organizations treat cybersecurity like people once treated hygiene—poorly. + Security shouldn't be based on blind trust, it should be based on distrust, and verifiability. Most organizations treat cybersecurity like people once treated hygiene—poorly.
At Distrust, we've identified fundamental methods to eliminate entire categories of risk at their source. Similarly to how handwashing revolutionized public health by preventing unseen threats like bacteria, our first-principles security methodology brings new levels of security to our clients by eliminating single points of failure, and providing verifiable, resilient protection for critical systems.
--
-
- First-principles security
-
Attack surface area reduction through eliminating root causes.
-
- - Proven methodology
-
Methodology tested in high-stakes, mission-critical environments.
-
- - Seamless collaboration
-
Clear, actionable engagement steps—start immediately.
-
-
ready to take your security to the next level?
diff --git a/_layouts/software.html b/_layouts/software.html index 352b71b..32cc1f9 100644 --- a/_layouts/software.html +++ b/_layouts/software.html @@ -45,399 +45,104 @@our software
We are actively working on a number of different projects, and looking to fund others. Here is what's on the way and what's coming next.
-SourceId ensures that source code integrity is verifiable. It prevents tampering of archives and other formats used for delivering source code by standardizing code and generating a hash-based fingerprint of the tree which includes all essential files.
--
backlog (fundraising)
+ +Bootproof
+Prove what software booted on a system via remote attestation technologies.
+SigRev is a crowdsourcing framework extending SourceID with signed code reviews. It enhances open-source security by making comprehensive manual reviews discoverable, overcoming the limitations of static analysis tools.
--
SourceId
+Verify source code inegrity with hash-based fingerprints.
+StageX is a hermetic, deterministic and reproducible toolchain providing multi-signed OCI images for popular software. This approach removes single points of failure in sofware builds.
--
SigRev
+Crowdsource and discover signed manual code reviews.
+ReprOS is a bare-bones immutable OS designed for securely reproducing and signing software. Each build is executed in a one-time use environment, eliminating persistent risks.
--
in-progress
+ +Trove
+Documentation for managing secrets that you can't afford to lose.
+Keyfork simplifies cryptographic material management by deriving any number or type of keys from a single entropy source. This greatly simplifies secret management complexity while maintaining security.
--
ReprOS
+Create ephemeral build environments to eliminate persistent risks.
+Icepick provides a framework for offline verified cryptographic signing operations. Its modular design provides a unified interface for a wide range of cryptographic signing tasks.
--
EnclaveOS
+Immutable operating system for powering secure enclaves.
+AirgapOS is a minimal, immutable offline first environment for secret management. It ships with a swiss-army knife of tools and an extensibility framework to cover most secure administration needs.
--
Bootproof provides a way to prove what software booted on a given system by leveraging platform hardware or firmware remote attestation technologies.
--
AirgapOS
+Minimal, immutable, offline-first swiss-army knife for secret management.
+EnclaveOS is a minimal and immutable operating system for running security critical software with high accountability. It can be extended to support multi-party management of secrets such that no person can control them alone.
--
Keyfork
+Derive keys from a single entropy source to simplify their management.
+Detailed set of practices, ceremonies and documentation for generating, backing up and using secrets that you can't afford to lose. Combines the best of tactics of major custodians as an open framework available for everyone.
--
Icepick
+Framework for offline cryptographic signing operations.
+powered by distrust
-Companies are already choosing to adopt our methodologies and tooling to help secure their systems.
-
The SUI cryptocurrency is leveraging StageX to build their nodes in a deterministic manner in order to eliminate single points of failure.
- - Learn more - → - -
Using StageX to build their widely used Talos Linux distribution specialized in delivering kubernetes features.
- - Learn more - → - -want to help with our vision?
If you would like to help us, please sponsor our work or get involved as a contributor.
diff --git a/_sass/base.scss b/_sass/base.scss index 860e288..0f87353 100644 --- a/_sass/base.scss +++ b/_sass/base.scss @@ -219,6 +219,83 @@ a:hover { justify-content: left; } +/* software page */ +.kanban-column { + border:1px solid #282D38; + padding: 20px 20px !important; + flex-direction: column; + justify-content: flex-start !important; + min-height: 860px; +} + +.kanban-column a { + width: 100%; +} + +.mini-card { + border: 1px solid #232730; + margin-bottom: 20px; + padding: 20px 30px; + min-height: 150px; + display: flex; + justify-content: space-between; + flex-direction: column; + filter: brightness(60%); + transition: filter 0.3s ease; +} + +.mini-card:hover { + filter: brightness(100%); +} + +.mini-card p { + margin: 0px; + font-size: 1rem; + color: var(--light-grey); +} + +.mini-card { + font-size: 1rem; +} + +.mini-card b { + font-size: 1.3rem; + color: white; +} + +.mini-card a { + font-size: 1rem; +} + +#kanban h4 { + margin-bottom: 40px; + font-weight: 600; +} + +.floating-card { + position: relative; +} + +.column-backlog .mini-card:hover { + border: 1px solid white; +} + +.column-progress .mini-card:hover { + border: 1px solid var(--light-teal); +} + +.column-active .mini-card:hover { + border: 1px solid var(--light-purple); +} + +.kanban-column a:hover { + background: none; +} + +#roadmap { + margin-bottom: 60px; +} + .roadmap a:hover { background: transparent; } @@ -305,6 +382,10 @@ a:hover { color: white !important; } +.mini-card:hover .arrow { + transform: translateX(5px); +} + .arrow-link:hover { background: none !important; background-color: var(--base-color); @@ -347,19 +428,35 @@ a:hover { margin-bottom: 50px; } + + .powered-by .card { - border: 1px solid var(--light-teal); - min-height: 360px; + display: flex; + flex-direction: column; + border: 1px solid var(--mid-grey); + min-height: 405px; padding: 35px; - background: var(--void-teal); + background: none; } .powered-by img { - width: 150px; + width: 100%; + max-width: 200px; +} + +.powered-by .img-container { + display: flex; + justify-content: flex-start; + align-items: center; + height: 60px; +} + +.powered-by a { + margin-top: auto; } .video-background { - left: 85%; + left: 85%; width: 200px !important; } @@ -404,6 +501,61 @@ a:hover { padding: 2rem; } +.video-background-philosophy { + left: 85%; + width: 200px !important; +} + +.video-background-container-philosophy { + position: absolute; + width: 100%; + height: 800px; + overflow: hidden; + top: 3150px; + left: 0; + z-index: -1; +} + +.gradient-overlay-philosophy { + background: linear-gradient(to bottom, #0f0f0f 0%, rgba(15, 15, 15, 0) 25%, rgba(15, 15, 15, 0) 75%, #0f0f0f 100%), linear-gradient(to left, rgb(15, 15, 15) 0%, rgba(15, 15, 15, 0) 100%); + position: absolute; + top: 0; + left: 0; + width: 100%; + height: 100%; + z-index: -1; + pointer-events: none; +} + +.video-background-philosophy { + position: absolute; + top: 50%; + left: 50%; + min-width: 100%; + min-height: 100%; + width: auto; + height: auto; + transform: translate(-50%, -50%); + z-index: -1; + object-fit: cover; +} + +.video-content-philosophy { + position: relative; + z-index: 1; + color: #fff; + padding: 2rem; +} + +.why-choose-distrust .properties .flex-container-inner { + border-top: 1px solid var(--light-purple); + margin-right: 40px; +} + +.why-choose-distrust svg { + margin-top: 20px; +} + @media only screen and (max-device-width: 500px) { * { font-size: $mobile-font-size; @@ -602,13 +754,18 @@ hr { margin-top: 50px; } +.inner-menu-content a:hover { + background: unset; + color: white; +} + .menu-content div { margin: 30px; } /** -* Services Page -*/ + * Services Page + */ .why-distrust { text-align: left; padding-bottom: 15px; @@ -657,6 +814,11 @@ hr { color: var(--light-grey); } +.team a:hover { + background: unset; + color: white; +} + .team img { height: 130px; border: 1px solid teal; @@ -667,7 +829,6 @@ hr { } .team h5 { font-size: 20px !important; - text-transform: lowercase; } .team .flex-container-inner { @@ -1411,10 +1572,6 @@ pre { transition: opacity 0.3s; } -.logo-slider img:hover { - opacity: 1; -} - /** * Carousel */ @@ -1555,9 +1712,6 @@ pre { margin-bottom: 50px; } - .flex-container { - } - .hide { display: inline-block; } @@ -1585,6 +1739,38 @@ pre { } @media (max-width: 600px) { + .mini-card { + padding: 20px 20px !important; + filter: brightness(100%) !important; + } + + .kanban-column { + border: none !important; + padding: 0px !important; + } + + #kanban { + flex-direction: column-reverse; + } + + #kanban h4 { + width: 100%; + text-align: center; + margin-bottom: 20px; + } + + .column-backlog .mini-card { + border: 1px solid white; + } + + .column-progress .mini-card { + border: 1px solid var(--light-teal); + } + + .column-active .mini-card { + border: 1px solid var(--light-purple); + } + .flex-container { flex-direction: column; } @@ -1635,7 +1821,7 @@ pre { } p { - font-size: 1.1rem !important; + font-size: 1.1rem !important; } h1 { @@ -1704,21 +1890,21 @@ pre { line-height: 1.5rem; } - /** - * Services Page - */ +/** + * Services Page + */ .why-distrust { height: 45px; } - /** - * End Services Page - */ +/** + * End Services Page + */ - /** - * Roadmap Page - */ - /** - * End Roadmap Page - */ +/** + * Roadmap Page + */ +/** + * End Roadmap Page + */ } diff --git a/assets/base/icons/keyoxide-icon-158x256.png b/assets/base/icons/keyoxide-icon-158x256.png new file mode 100644 index 0000000000000000000000000000000000000000..92cb63e184b205c2b32a106d250eb45dbf5f540d GIT binary patch literal 7093 zcmeHL)mt0TlMU_!hvLQEtw_-nDN>*mFTtTH1Sk^Rr3D(?rFe07DITCW#ocKM?!NrK zZ(sId|AO87GIM9<+?jLk+kAbesZ4-NjSBz(2vk*+be?S%0DuC(Mtk<$F604UotVXu(GjpaB^|;@bd8s2nq>{h>D3zypoiX
zmU%5JC$FHW1bU;aqN?^*T|-mrowkndd%X|(28Kq)CZ-?Fz~&Z~R@OGQcJ`kjpB)^b
zPR=f0T;1F~V4hyyKE8hb0f9lmA)#U65nsPWMn!*z$Hd0PCnP2%r=+H(XJlq&|H#SB
z%P%M_`dM63T2@|BSyf$ATUX!E*woz8+ScCjtFx=Sr?;;kF)%pvdw67YY XoY+_J$1*S(UoF*0ZbYOD~3}b?pKB#FG%a;u%!BtG+TGIvm>_%j&> `Rodh^;
z#4P_uOi~*}RPIF-jv|{z8|(@n+hN288nu|0+FRWbd0PrGpYHgj=wE-GtKlb!Wp#gV
z3-_iM6=V2TX5L|F!%ZHS$4ICf^0)0Z7@1$|bmeVS{d2l=cR1DW57E~`x0B9G6`QhQ
zJG3>v7)iWlzj=aHrhRWfWJjyo(GJQGt*1Z6;t^Cea32=5kZ%~PsxBZ?sjmF=s-TWXp42L41^l~iUr5%?
8)qlUf-DS$^skL0>6;6A%uFBm9O7$|71+&Nmm9f5te>`mUWwsBK3n1BZ5D0or$CO
z2DPNqtoH}0Q9O+Cq54gM;G?Y@lW%luq|+~9fU`4!>W!hKnE^`K&lVGNNt!6nt90mj
zpY)k>(m1%eDr3fGpUUM~xSJNKIy7pLW5rHeB|7}yz@35bdym|Ej@6uC2@}2TD`q
zG~8~ym8DkIkzk*3NlO5uz
1j-nXQ4J=oZVD2SSZ|C`xcah
z;$wMnHM{cL&99i)@G-