How can we help you?
Distrust offers a wide range of services which are tailored to your organization. Whether you need a complete security assessment, want to create or improve an open source security tool, or want to focus on assessing a specific aspect of your organization or system - we are here to help. Our experienced staff will collaborate closely with you to understand your unique needs and create a tailor made solution that works for you.
Request a Quote
We offer full stack security assessments, covering anything that is in scope for a sophisticated adversary, such as compromising a third party library, bribing a devops engineer, finding an oversight in your code, or otherwise. While we will point out specific flaws we find, we feel we offer the most value in helping you identify where you can make strategic improvements to your architecture to take entire classes of risk off the table.
- Penetration Testing
- Secure Code Review
- Cloud Configuration Review
- Threat Modeling
Our team is comprised of security engineers with past lives as full time system administrators and software engineers. We have extensive first hand experience in implementing custom security defenses for high risk organizations. We are happy to get as deep into the weeds planning new defense strategies as you like, from Linux kernel hardening, to supply chain signing, to code quality, library choices, and beyond.
- Secure Code Development
- Cryptocurrency Custodial Solutions
- Quorum Authentication Design and Implementation
- Cryptographic Key Escrow / Signer
- Reproducible / Deterministic Builds
- Production Engineering Practice
Retained Security Support
We offer monthly retainer contracts to augment your existing security team with access to our combined experience as needed. You can drop questions to our team in a chat, or include us in security-relevant meetings. Almost anything an in-house security team might do to protect your organization is in scope for us as well, including qualifying candidates, conducting interviews, reviewing code, evaluating third party risks, or being a security voice in the room when you are planning new products.
- Security Program Development
- General Security Consulting
- Assistance With Hiring Security Talent
- Business Continuity Planning
- Physical Security
Research & Development
Rather than write the same document or tool 10 times and bill each client for it, we focus our unused retainer hours on open sourcing every document and tool we legally can, so we can focus our time with clients on their unique needs. If we are doing public work you would like so see more of, or that almost meets your needs, we would love to hear from you and figure out a path to see your needs met.
- keyfork: a hierarchical deterministic key management toolkit
- ocirep: oic base images for deterministic builds
- airgap: a minimal linux distro for high risk scenarios
- git-sig: a multi-sig trust toolkit for git