Below lies a list of analyses regarding security and privacy-focused topics. The security assessments make no
attempt at evaluating security based on the number of former vulnerabilities in a particular program. Instead,
criteria involve the software's overall security posture and ease of exploitation. Primarily, the assessments
include an analysis of the software's attack surface exposure, as well as the adoption of modern defensive
techniques. In particular, they study the deployed exploit mitigations and the extent to which different parts
of the software are compartmentalised, as is necessary to reduce the potential harm a successful exploit
could produce. Note that these analyses are purely objective and do not account for threat models or other
user-dependent factors.
Likewise, the privacy evaluations are focused on meaningful approaches to achieving privacy, rather than incomplete
and misguided approaches, as is common elsewhere. It is important to create a clear distinction between privacy and
security to avoid conflating the subjects of any particular article.
The articles below are guides dedicated to improving security and privacy.
My name is "madaidan". I'm a security researcher who works on
various open source projects, mainly Whonix. My website
provides information on security and privacy-related topics — it aims to highlight security issues
within popular technology, debunk misinformation and provide free security guidance for everyone. This
website was created by me, with help from concat and a few other friends.
You can contact me on various platforms, including Reddit, Matrix and Telegram. I operate a bridged Matrix room and Telegram
group that I'm often active in.
If you wish to support me and my work, you can donate using the following addresses:
bc1q6eqphq0qy25eypmq4q2s9fqdj0g4kww6zw0hsv
0xFB71c3a10a1DAb3Ccd6cdEA96e0f62086871a826
894Ngkskmch5VV9ZQVzh5x6ujuVA7oUV33f8zpH2KsnhKxnSzHrAJB3PztGSy2MQQx1GwCjf94TLp5C8HfYJRWjQD9yEdx3
DREbJGC15jJmCtVGPsuvq2zHMzt5tCnN74