Virtualization of the operating system to protect the transfer of sensitive data via VPN [closed]

Starting point:
I want to transfer sensitive company data over the Internet to my Windows 10 computer at home. We assume that this works with the help of a software-based VPN (e.g. using IPsec).
Problem:
VPN software is installed on the co… Continue reading Virtualization of the operating system to protect the transfer of sensitive data via VPN [closed]

How to encrypt and hide a GNU/Linux operating system and create a decoy system?

My goal is to be protected against key disclosure laws and possible extortion. I know dm-crypt can be used to perform full disk encryption for GNU/Linux distros. However, it is not enough. I want to be able to hide an operating system in a… Continue reading How to encrypt and hide a GNU/Linux operating system and create a decoy system?

Does moving webAuthn API from browser to OS improves security of registration process?

Usually, for all types of authentications, we trust the registration process and assume there is no attack is happening Like in the case of FIDO2 registration. However, as the registration process is built within the browser and can be com… Continue reading Does moving webAuthn API from browser to OS improves security of registration process?