Security & Privacy β€” Stack of Truths

Security & Privacy

Last updated: April 5, 2026

At Stack of Truths, we take security seriously β€” not just for our clients, but for their customers too. This page explains how we protect your data, maintain confidentiality, and ensure every report is verifiably authentic.

πŸ” AES-256-CBC + PBKDF2

Your data is encrypted using the same standard as banks and governments.

πŸ“„ CyberFlex Report Security β€” Complete

Every client receives a tamper-proof, verifiable report package. No one can fabricate a CyberFlex report β€” the GPG signature and hash verification make it mathematically provable.

πŸ“ What clients receive:

report.html ← Original HTML report

report.pdf ← Branded PDF with watermark on every page

report.pdf.asc ← GPG digital signature

πŸ”‘ How clients verify authenticity:

# 1. Download public key curl http://187.124.233.248/cyberflex_pub.asc # 2. Verify GPG signature gpg –verify report.pdf.asc report.pdf # Output: Good signature from “CyberFlex Security Team” # 3. Check SHA-256 hash sha256sum report.pdf # 4. Compare against verification API curl http://187.124.233.248:8081/api/verify/<REPORT_ID>

βœ… Compliance & Assurance

AuthenticityGPG signature β€” proves report came from CyberFlex
IntegritySHA-256 hash β€” proves report wasn’t modified
Non-repudiationGPG key tied to CyberFlex identity
WatermarkDiagonal “CYBERFLEX CONFIDENTIAL” on every PDF page
VerificationPublic API endpoint + public key download

πŸ“‹ Data Encryption at Rest

All client booking information, target domains, and audit data are encrypted immediately upon submission using:

  • AES-256-CBC β€” Military-grade encryption algorithm
  • PBKDF2 β€” Key derivation with 100,000 iterations
  • Unique passphrase β€” Stored with 600 permissions (owner-only access)
openssl enc -aes-256-cbc -salt -pbkdf2 -iter 100000 \ -in client_data.json \ -out client_data.json.enc

πŸ”’ Confidentiality & Non-Disclosure

Every client engagement is protected by a strict confidentiality agreement. I do not share findings, reports, or client identities without explicit written permission.

If you require a signed NDA before discussing your project, just ask β€” I provide one for every engagement.

πŸ›‘οΈ Secure Pentesting Environment

All security assessments are performed on a dedicated, isolated pentest laptop:

  • No cross-contamination with production systems
  • Air-gapped where required
  • Tailscale VPN for secure remote access
  • UFW firewall with strict port rules
  • SSH with 2FA (Google Authenticator)

πŸ“ Data Retention & Deletion

Client data is retained only as long as necessary:

30-90 daysAudit reports and findings
7 yearsInvoices (tax/legal requirement)
On requestFull data deletion

You may request deletion of your data at any time. I will confirm deletion within 72 hours.

πŸ” Infrastructure Security

Your data resides on a VPS with the following protections:

  • βœ… Daily automated backups
  • βœ… Firewall (UFW) with minimal open ports (22, 80, 443, 8081, 8090)
  • βœ… Tailscale mesh VPN for authorized access only
  • βœ… SSH key + 2FA authentication
  • βœ… Regular security updates and patching

πŸ“§ What Information We Collect

When you book a pentest, we collect:

  • Your name, email, and company (for engagement purposes)
  • Target domains or IP addresses (for testing)
  • Digital signature authorization (for legal compliance)
  • Payment information (processed securely via Stripe β€” we never store your card details)

πŸ”“ Your Rights (GDPR & CCPA)

You have the right to:

  • Access β€” Request a copy of your data
  • Correct β€” Update inaccurate information
  • Delete β€” Request removal of your data
  • Portability β€” Receive your data in a structured format

For privacy requests, DM @StackOfTruths on X or email info@stackoftruths.com.

πŸ“ž Contact Us

If you have any security concerns or privacy questions:


🦞 Stack of Truths β€” AI Penetration Testing for Small Entrepreneurs
KVK 94992266 Β· Registered in Amsterdam, Netherlands

Oh hi there πŸ‘‹
It’s nice to meet you.

Sign up to receive awesome content in your inbox, every month.

We don’t spam! Read our privacy policy for more info.

You cannot copy content of this page

Follow by Email
YouTube
YouTube
LinkedIn
LinkedIn
Share
Telegram