Security is a top priority at privacy.sexy. Please report any discovered vulnerabilities responsibly.
Efforts to responsibly disclose findings are greatly appreciated. To report a security vulnerability, follow these steps:
- For general vulnerabilities, open an issue using the bug report template.
- For sensitive matters, contact the developer directly.
Upon receiving a security report, the process involves:
- Confirming the report and identifying affected components.
- Assessing the impact and severity of the issue.
- Fixing the vulnerability and planning a release to address it.
- Keeping the reporter informed about progress.
privacy.sexy adopts a defense in depth strategy to protect users on multiple layers:
- Link Protection: privacy.sexy ensures each external link has special attributes for your privacy and security. These attributes block the new site from accessing the privacy.sexy page, increasing your online safety and privacy.
- Content Security Policies (CSP): privacy.sexy actively follows security guidelines from the Open Web Application Security Project (OWASP) at strictest level. This approach protects against attacks like Cross Site Scripting (XSS) and data injection.
- Host System Access Control: The desktop application segregates and isolates code sections based on their access levels through sandboxing. This provides a critical defense mechanism, prevents attackers from introducing harmful code into the app, known as injection attacks.
- Auditing and Transparency: The desktop application improves security and transparency by logging application activities and retaining files of executed scripts This facilitates detailed auditability and effective troubleshooting, contributing to the integrity and reliability of the application. Recognizing that some users prefer not to keep these records, privacy.sexy provides specialized scripts for deletion of these logs.
- Privilege Management:
The desktop application operates without persistent administrative or
sudo
privileges, reinforcing its security posture. It requests elevation of privileges for system modifications with explicit user consent and logs every action taken with high privileges. This approach actively minimizes potential security risks by limiting privileged operations and aligning with the principle of least privilege. - Secure Script Execution/Storage:
- Antivirus scans: Before executing any script, the desktop application stores a copy to allow antivirus software to perform scans. This step allows confirming that the scripts are secure and safe to use.
- Tamper protection: The application incorporates integrity checks for tamper protection. If the script file differs from the user's selected script, the application will not execute or save the script, ensuring the processing of authentic scripts. This safeguards against any unwanted modifications.
- Clean-up: Recognizing that some users prefer not to keep these records, privacy.sexy provides specialized scripts for deletion of these scripts. This allows users to maintain their privacy by removing traces of their usage patterns or script preferences.
privacy.sexy benefits from automated update processes including security tests. Automated deployments from source code ensure immediate and secure updates, mirroring the latest source code. This aligns the deployed application with the expected source code, enhancing transparency and trust. For more details, see CI/CD Documentation.
Every desktop update undergoes a thorough verification process. Updates are cryptographically signed to ensure authenticity and integrity, preventing tampered versions from reaching your device. Version checks are conducted to prevent downgrade attacks.
privacy.sexy's testing approach includes a mix of automated and community-driven tests. Details on testing practices are available in the Testing Documentation.
For help or any questions, submit a GitHub issue. Addressing security concerns is a priority, and we ensure the necessary support.
Support privacy.sexy's commitment to security by making a donation ❤️. Your contributions aid in maintaining and enhancing the project's security features.
Active contribution to the safety and security of privacy.sexy is thanked. This collaborative effort keeps the project resilient and trustworthy for all.