Compare commits

..

No commits in common. "561761f581fae18cc44787f5db2ed500a1fc4588" and "2d4f2453e99ef94ed001d9a8c86753d4114ac7f0" have entirely different histories.

1 changed files with 4 additions and 13 deletions

View File

@ -9,15 +9,6 @@
{%- include header.html -%} {%- include header.html -%}
<main> <main>
<section>
<h2>About Distrust</h2>
<p>Distrust was founded in order to improve the security, privacy and freedom of individuals and organizations and promote principles of Open Source software worldwide. We specialize in helping organizations reduce risk through a holistic first principles approach rather than simply checking boxes according to often outdated "best practices".
</p>
<p>Close collaboration with our clients allows us to attain a deep understanding of technology stacks which we use to help teams refine threat models and ensure that the mitigating controls being used establish a reasonable level of security accordingly. We do this by offering variety of services which are tailored to fit the client needs, ranging across penetration tests, secure code review, threat modelling, system architecture design, supply chain security, infrastructure hardening, and more. One of our specialties is designing secure systems for management of cryptographic material, especially in the context of blockchains.
</p>
<p>Our clients are varied, many of them from high risk areas such as financial institutions, blockchain companies managing large quantities of cryptocurrency and electrical grid operators to name a few. We proudly continue to support such organizations, and use the knowledge we have attained to aid all our clients in achieving a better security posture.</p>
</section>
<section> <section>
<h2>Approach</h2> <h2>Approach</h2>
<p>Like most security firms, we often start relationships with full stack audits. We also have enough experience in this industry to admit another firm will find bugs we missed, and vice versa. Our true goal in audits is to understand your threat model and find a path to fundamentally remove entire classes of relevant attack surface.</p> <p>Like most security firms, we often start relationships with full stack audits. We also have enough experience in this industry to admit another firm will find bugs we missed, and vice versa. Our true goal in audits is to understand your threat model and find a path to fundamentally remove entire classes of relevant attack surface.</p>
@ -26,13 +17,13 @@
<li>Can your Google Authenticator codes be phished?</li> <li>Can your Google Authenticator codes be phished?</li>
<li>Can your SMS 2FA solution be SIM Swapped?</li> <li>Can your SMS 2FA solution be SIM Swapped?</li>
<li>Can someone tamper with your Git repos or CI/CD systems?</li> <li>Can someone tamper with your Git repos or CI/CD systems?</li>
<li>Would it be profitable for someone to buy a $50,000 0day to compromise an employee devices?</li> <li>Would it be profitable for someone to buy a $50,000 0day to compromise employee devices?</li>
<li>What happens when the FedEx guy leaves a tampered USB C cable on a conference table?</li> <li>What happens when the FedEx guy leaves a tampered USB C cable on a conference table?</li>
<li>Who reviews the code of your third party dependencies?</li> <li>Who reviews the code of your third party dependencies?</li>
<li>What happens when your IT administrator is compromised? Or a production engineer?</li> <li>What happens when your IT administrator is compromised? Or a production engineer?</li>
<li>Can a change in local political landscape fundamentally halt your business?</li> <li>Can a change in local political landscape fundamentally halt your business?</li>
<li>Can someone buy a server next to yours and steal your secrets via a side channel attack?</li> <li>Can someone buy a server next to yours and steal your secrets via a side channel attack?</li>
<li>How do you know the offline laptop with the keys to the kingdom has not been tampered with?</li> <li>How do know the offline laptop with the keys to the kingdom has not been tampered with?</li>
<li>Do you have a plan for <i>when</i> your production systems are compromised?</li> <li>Do you have a plan for <i>when</i> your production systems are compromised?</li>
</ul> </ul>
<br /> <br />
@ -51,7 +42,7 @@
<ul> <ul>
<li>We will never ask you to give us access to production systems or have any power over your org.</li> <li>We will never ask you to give us access to production systems or have any power over your org.</li>
<li>Anyone with access to significant value is at personal risk. We teach distrust to protect people.</li> <li>Anyone with access to significant value is at personal risk. We teach distrust to protect people.</li>
<li>We will always provide a way for you to build and verify any binaries we provide.</li> <li>We will always provide a way for you to build and verify any binaries we provide yourself.</li>
<li>We are happy to provide you any background research we legally can so you can make your own conclusions.</li> <li>We are happy to provide you any background research we legally can so you can make your own conclusions.</li>
</ul> </ul>
@ -60,7 +51,7 @@
<h4>Transparency</h4> <h4>Transparency</h4>
<ul> <ul>
<li>We regularly open source our research and common advice to get input and corrections from others in our industry.</li> <li>We regularly open source our research and common advice to get input and corrections from others in our industry.</li>
<li>Prices are always the same. We will sometimes adjust based on demand, but everyone is offered the same rates.</li> <li>Prices are always public. We will sometimes adjust based on demand, but everyone is offered the same rates.</li>
<li>With the exception of fully Open Source projects, which we offer a universal 15% discount on.</li> <li>With the exception of fully Open Source projects, which we offer a universal 15% discount on.</li>
</ul> </ul>