Security & Privacy Evaluations

Below lies a list of analyses regarding security and privacy-focused topics. The security assessments make no attempt at evaluating security based on the number of former vulnerabilities in a particular program. Instead, criteria involve the software's overall security posture and ease of exploitation. Primarily, the assessments include an analysis of the software's attack surface exposure, as well as the adoption of modern defensive techniques. In particular, they study the deployed exploit mitigations and the extent to which different parts of the software are compartmentalised, as is necessary to reduce the potential harm a successful exploit could produce. Note that these analyses are purely objective and do not account for threat models or other user-dependent factors.

Likewise, the privacy evaluations are focused on meaningful approaches to achieving privacy, rather than incomplete and misguided approaches, as is common elsewhere. It is important to create a clear distinction between privacy and security to avoid conflating the subjects of any particular article.

Security

Privacy

Guides

The articles below are guides dedicated to improving security and privacy.

About

My name is "madaidan". I'm a security researcher who works on various open source projects, mainly Whonix. My website provides information on security and privacy-related topics — it aims to highlight security issues within popular technology, debunk misinformation and provide free security guidance for everyone. This website was created by me, with help from concat and a few other friends.

You can contact me on various platforms, including Reddit, Matrix and Telegram. I operate a bridged Matrix room and Telegram group that I'm often active in.

If you wish to support me and my work, you can donate using the following addresses: