Best Practice for Creating and Accessing an Encrypted Database with a Strong Threat Model

Goal:
I’m seeking feedback on the most secure setup for creating and accessing an encrypted database (KDBX4 format) that minimizes exposure to potential remote attacks. This database will contain highly sensitive information, and my primar… Continue reading Best Practice for Creating and Accessing an Encrypted Database with a Strong Threat Model

What to consider when routing priviledged ports to sandboxed services? net.ipv4.conf.eth0.route_localnet=1 vs CAP_NET_BIND_SERVICE

The use case is: running isolated services, either as a hardened systemd unit file — with close to a zero score on systemd-analyze security, or a linux container.
Both of those will place services listening on localnet (127.0.0.0/8-ish) o… Continue reading What to consider when routing priviledged ports to sandboxed services? net.ipv4.conf.eth0.route_localnet=1 vs CAP_NET_BIND_SERVICE

Is an isolated VM (Hyper-V) still safe despite the fact that the host uses RDP to view/control the VM?

This question is directed towards creating an isolated environment for a reverse engineering VM, where malicious programs will be disassembled, debugged by executing them, so static and dynamic analysis etc.

The VM will have no internet c… Continue reading Is an isolated VM (Hyper-V) still safe despite the fact that the host uses RDP to view/control the VM?

Is using a singularity sandbox an effective way to increase security through isolation / compartmentalization?

I am using singularity sandboxes in my workflow for several reasons unrelated to security. However, after using it a bit, I am now wondering: is using a singularity sandbox an effective way to increase security by enforcing isolation / com… Continue reading Is using a singularity sandbox an effective way to increase security through isolation / compartmentalization?