Technical Security Track
Technical notes for deeper threat-modeling and exposure review.
CSP Exfiltration Analysis
Analysis of browser-based data exfiltration vectors and how CSP and VPE address each one.
Endpoint and Browser Leakage Model
Technical model of how endpoint state and browser context can break document anonymity goals.
Evidence Handling Chain
Technical integrity practices for preserving document credibility while reducing exposure.
Metadata Forensic Traces
Technical overview of metadata and structural traces that can persist in PDF workflows.
Network Model Limits
Where network privacy controls help and where they do not in document-sharing workflows.
Reproducible Build Verification Basics
Why reproducible client builds matter for trust and how to verify what you run.
Residual Risk Disclosure
Honest disclosure of what the VPE cannot protect against, with practical recommendations.
Threat Modeling Workflow
A practical model for deciding which controls matter for your document-sharing risk.
Verified Processing Environment (VPE)
Architecture of the VPE system that proves no data leaves the browser during PDF processing.