-
tell us about your biggest security challenges
-security without blind trust
-Distrust secures mission critical infrastructure by applying a first principles approach. No guessing, no shortcuts, only verifiable security.
+Distrust secures mission-critical infrastructure by applying a first principles approach. No guessing, only verifiable security.
Work with us
@@ -27,7 +27,6 @@
-
our services today, our vision for tomorrow
+our services today, our vision for tomorrow
+services
-We don’t just assess risks—we eliminate them. Our first principles approach removes single points of failure, protects mission-critical systems, and ensures verifiable security. Whether you need a full audit, architecture review, incident response, or ongoing retained support we have you covered.
+Our threat model approach stems from working with high-risk orgs, uniquely positioning us to offer advice and support others can't. We specialize in system architecture design, security assessments, penetration tests, smart contract audits, and infrastructure hardening.
+We specialize in system architecture design, security assessments, penetration tests, smart contract audits, and infrastructure hardening. Hire Distrust to solve your hardest security challenges.
- Learn more + Explore services →
software
-Security is always evolving—so are we. Distrust is building the next generation of security infrastructure that eliminates reliance on any single computer, person, or system. Using full-source bootstrapping, determinism, and quorum-based security, we ensure verifiable, trustless protection at every layer.
+We build open source software that eliminates reliance on any single computer, person or system. Our tooling unlocks a new level of trust in infrastructure through uncompromising transparency and verifiability. Explore and start using our open source tools today.
+We develop open source software that eliminates reliance on any single computer, person or system. Explore active tools and what's coming soon.
View software → @@ -63,8 +66,12 @@
- hire Distrust to solve your hardest security challenges + solve your hardest security challenges
Built by engineers behind BitGo, Unit410, and Turnkey, we apply hard-earned lessons from securing critical infrastructure to build transparent, resilient, and universally applicable security solutions.
@@ -32,52 +32,18 @@why choose Distrust
-Benefit from our approach—a blend of proven methodologies and open source tooling we created, shaped by lessons from securing some of the world's highest-risk organizations.
--
Eliminate root causes
-We don't just scan for bugs—we eliminate entire categories of bugs at the source using a first-principles methodology.
-Verifiable
-No guessing, no shortcuts. Every recommendation is backed by logic and rigor, not gut feel or just to check boxes.
-Proven track record
-Our security engineers have secured some of the highest risk infrastructure in the world (BitGo, Turnkey, Unit 410).
-Embedded collaborations
-We act as true partners— our goal is to make our clients succeed and not depend on us.
-our services
-Distrust offers high-impact security consulting and open-source tooling for companies that can't afford to fail. +
Distrust offers high-impact security consulting and open source tooling for companies that can't afford to fail.
retainer / fractional CISO
-Get ongoing security leadership tailored precisely to your organization's needs. We embed with your team to provide strategic security direction and eliminate blind trust from your infrastructure—so you're prepared before threats emerge.
+Get ongoing security leadership tailored precisely to your organization's needs. We embed with your team to provide strategic security direction and eliminate blind trust from your infrastructure—so you're prepared before threats emerge.
- Security program development
- Incident response @@ -85,7 +51,7 @@
- Vetting security talent
- @@ -93,15 +59,15 @@
security assessments
-Our assessments go beyond vulnerability scans—we eliminate risks at their source. Using first-principles threat modelling, we identify single points of failure and deliver actionable recommendations to secure your systems against sophisticated threats.
+Our assessments go beyond vulnerability scans—we eliminate risks at their source. Using first-principles threat modelling, we identify single points of failure and deliver actionable recommendations to secure your systems against sophisticated threats.
- Secure architecture review
- Security audits
- Penetration testing -
- Secure code review +
- Smart contract audits
- @@ -109,6 +75,10 @@
ready to take your security to the next level?
-We help organizations that can't afford to fail. If security is mission-critical for your company, let's talk.
- --
verifiable security without single points of failure
+open source tools for verifiable security
Most systems still rely on single individuals or computers, unverifiable software, and opaque processes. We’re redesigning security for transparency from the ground up.
creating the building blocks for provable security
-Modern software systems still rely on trust in individuals—maintainers, IT admins, or third-party providers. But what happens when they are compromised? How do you verify that the software running on your systems hasn’t been tampered with?
-We’ve identified critical missing pieces needed to remove single points of failure at every level. Our approach covers the complete lifecycle of software from your toolchains and dependencies to how your code is built, signed, verified and deployed.
-By combining multi-party trust, remote attestation, and bit-for-bit reproducibility, we are methodically eliminating trust assumptions, ensuring security isn’t just a claim—it’s provable. And as everything we do, all our software is open source.
+building blocks
for provable security
+ Modern software systems still rely on trust—maintainers, IT admins, third-party providers. But what happens when they are compromised? How do you verify that your systems haven't been tampered with?
+We’ve identified critical gaps and built tools to remove single points of failure across all levels of the software lifecycle—from toolchains and dependencies to how code is built, signed, verified and deployed.
+By combining multi-party trust, remote attestation, and bit-for-bit reproducibility, we are eliminating trust assumptions, ensuring security isn't just a claim—it's provable. And as everything we do, all our software is open source.
See what we're building → @@ -45,15 +56,14 @@ - {% include powered-by.html %} -our software
-We are actively working on a number of different projects, and looking to fund others. Here is what's on the way and what's coming next.
+our roadmap
+We're actively building some tools—and raising support to build others. Here's what's in-progress and what's coming next.
backlog (fundraising)
+backlog (fundraising)
+backlog
Bootproof
Prove what software booted on a system via remote attestation technologies.
@@ -81,7 +91,7 @@in-progress
+in-progress
Trove
Documentation for managing secrets that you can't afford to lose.
@@ -108,7 +118,7 @@active
+active
StageX
Hermetic, deterministic, reproducible, multi-signed OCI-based build toolchain.
@@ -133,7 +143,7 @@ →Icepick
Framework for offline cryptographic signing operations.
❝Our mission is to use our knowledge to improve the security, privacy, and freedom of as many individuals as possible. We believe having verifiable foundations on which technologies can be built is a fundamental step toward improving the wellbeing of our species and solving the coordination problem.❝ — Distrust team
+❝We want to use our knowledge to improve security, privacy, and freedom for as many people as possible. We believe that verifiable foundations for building technology are essential to human wellbeing and solving the coordination problem.❝ — Distrust team
want to help with our vision?
-If you would like to help us, please sponsor our work or get involved as a contributor.
- diff --git a/_layouts/threatmodel.html b/_layouts/threatmodel.html index 40247e2..71c6c4a 100644 --- a/_layouts/threatmodel.html +++ b/_layouts/threatmodel.html @@ -3,16 +3,18 @@ {%- include head.html -%} {%- include header.html -%} +Distrust Threat Model
-Unlike conventional frameworks (e.g., STRIDE, PASTA) that focus on identifying and mitigating specific risks, the Distrust Threat Model assumes that at some level systems are already compromised. This pessimistic, assumption-driven approach focuses on building systems that can remain secure even when up against the worst case adversary that have reason to target an organization.
+Distrust threat model
+Distrust's threat model aids organizations in methodically eliminating surface area for attack, making entire classes of attacks impossible.
+
Unlike conventional frameworks (e.g., STRIDE, PASTA) that focus on identifying and preventing specific risks, our threat model assumes that at some level systems are already compromised. This pessimistic set of assumptions allows organizations to build systems that can remain secure even when up against their worst case adversary.
Levels
While the end-goal is to adequately address the risks which stem from the assumptions, organizations are at varying levels of maturity and often need a path towards mitigating threats in a phased approach. To this end, the threat model defines 4 levels, each corresponding to increasingly more sophisticated threat actors as the levels increase. Each threat actor is assumed to have access to specific methods of attack limited by factors such as cost to execute, sophistication, time required etc.
@@ -20,12 +22,14 @@+ +
Level 1
Defense against remote adversaries with limited resources.
Adversary
-An unskilled or lightly skilled individual leveraging widely available tools and publicly known vulnerabilities. Their attacks are largely opportunistic and automated. We do however assume they can be very patient and willing to work across a long time horizon.
+An unskilled or lightly skilled individual leveraging widely available tools and publicly known vulnerabilities. Their attacks are largely opportunistic and automated. We do, however, assume they can be very patient and willing to work across a long time horizon.
Capabilities
- Scanning for and exploiting known vulnerabilities with public exploits. @@ -37,7 +41,9 @@
+ +
Level 2
Defense against insiders.
@@ -57,7 +63,9 @@+ +
Level 3
Defense against well-funded organizations.
@@ -75,12 +83,14 @@+ +
Level 4
Defense against nation state actors.
Adversary
-A state-backed or similarly resourced entity capable of executing the most advanced forms of cyber and physical attacks, including full-spectrum operations across the supply chain, hardware, firmware, and human factors..
+A state-backed or similarly resourced entity capable of executing the most advanced forms of cyber and physical attacks, including full-spectrum operations across the supply chain, hardware, firmware, and human factors.
Capabilities
- Observe all displays and input devices in public areas. @@ -93,7 +103,27 @@
+ +
Applying the Threat Model
+The Distrust Threat Model challenges organizations to examine their systems through the lens of failure: not if things go wrong, but when. It provides a structured way to evaluate your current posture and identify which parts of your infrastructure need to withstand which kinds of adversaries — from opportunistic attackers to state-backed campaigns.
+Security isn’t one-size-fits-all. Different systems protect different kinds of value, and not every component needs Level 4 defenses. But understanding which ones do — and designing accordingly — is where resilience begins.
+ready to assess your risk?
+We help teams apply the Distrust Threat Model — mapping assets to adversaries and designing systems that stay secure, even when things go wrong.
+ +