Skip to content
This repository has been archived by the owner on Aug 23, 2024. It is now read-only.

Latest commit

 

History

History
50 lines (31 loc) · 2.38 KB

SECURITY.md

File metadata and controls

50 lines (31 loc) · 2.38 KB

Security Policy

Commitment

I take the security of this project very seriously. While it might not be immediately apparent how a vulnerability could impact a DNS filterlist, it's prudent to recognize that no system is completely secure. Thus, I remain fully committed to maintaining the security of users and encourage the responsible reporting of any potential vulnerabilities.

Supported Versions

Maintaining the security of this project is my top priority. Currently, support and attention to security concerns are provided for the following version:

Version Supported
Latest

Reporting a Vulnerability

If you uncover a potential security issue, I earnestly request your assistance in reporting it through responsible channels. I am in the process of implementing a more robust and secure reporting system. More details will be provided once this system is in place.

Contact Channels

Primary (Signal):

  • For secure and private communication, you can reach me on Signal

Secondary (Email):

  • Email: Vulnerabilities can be reported to my iCloud Hide My Email address: [email protected].

Tertiary (Social Media):

  • I can also be reached quickly on X @georgebaskervil: Note: X offers an encrypted DMs feature for premium subsribers, which is better than regular DMs for enhanced privacy. However, it's important to be aware that the platform's implementation of end-to-end encryption for DMs has been noted to have some flaws. Please consider the sensitivity of the information when using this communication channel.

Response Process

I am committed to reviewing reports and responding promptly as follows:

Response Process

We are committed to reviewing reports and responding promptly as follows:

  1. I will try my best to acknowledge receipt of your report within 48 hours.
  2. I will try my best to provide an initial assessment within one week.
  3. I will try my best to work to understand the potential impact and determine an appropriate resolution timeline.
  4. I will try my best to release an update, if necessary, with due acknowledgment given to your contribution towards enhancing the security measures of this project (unless anonymity is requested).