Home
Operations Security (OPSEC)
is a set of instruments facilitating privacy and security. Our approach to operations security builds upon high simplicity, ensured processing efficiency and cryptographic solutions of proven reliability.- Operations security solutions
- Compliance
- Fundamentals
- Servers and services
- Data security
- Network
Operational compliance with cybersecurity norms
Engineering and development of solutions by default compliant with current cybersecurity norms
Compliance with Polish and European policy- The General Data Protection Regulation (GDPR), EU Regulation 2016/679
- The Network Information and Security (NIS2), EU Directive 2022/2557
- The Act on the National Cybersecurity System, published on 5 June 2018., with the novelization of the Act on the National Cybersecurity System, a preview published on 29 December 2025, implementing NIS2 requirements
- Norm ISO/IEC 27001:2022 — an outline norm on Information Security Management Systems, with key extensions
- Norm ISO/IEC 27002:2022 — Information security
- Norm ISO/IEC 27701:2019 — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management
- Norm ISO/IEC 27017:2015 — Information security for cloud services
- Norm ISO/IEC 27018:2019 — Protection of personal data in public clouds
- Norms ISO/IEC 27033-1|2|3|4|5|6|7 — Network security
- Norms ISO/IEC 27034-1|2|3|5|5-1 — Application security
- Norm ISO/IEC 27040:2024 — Storage security
- Norm ISO/IEC 27100:2020 — Cybersecurity
Secure workstations and personal computers
Secure workstations and personal computers
Workstations and personal computers on macOSAn advanced commercial closed-source operating systems based on BSD traditions.
- System engineering
- Low-level operations
- System installation and advanced Recovery
- Boot procedure and startup disciplines
- Integrity protection mechanics of system resources
- Non-standard kernel extensions and modules
- Non-standard device drivers and compatibility with specialised devices
- Low-level operations
- Stability and performance
- Open-source software
- Standard instrumentation of applications and command-line user interfaces compatible with BSD and GNU / Linux
- A dedicated homebrew software packet manager
- Modern filesystems
- Apple APFS filesystem — a modern filesystem for newer macOS versions offering easy and universal data backup capabilities, volume snapshots and advanced encryption functions — solutions for encryption and authentication
- OpenZFS filesystem — an implementation of OpenZFS project for macOS in solutions for advanced filesystems and data storage and encryption and authentication
- Open-source software
- Security
- Advanced security model
- A model security configuration defined by macOS Security Compliance Project (mSCP) based on NIST 800-53 and NIST 800-219 directives, implemented in accordance with NIST 800-171, DoD CMMC or CNSSI supplementary extensions
- Network security
- Support for wireless networking standards and security of wireless data transfer
- Advanced support for secure local networks
- Advanced network management and packet filtering with Berkeley Packet Filter
- Network virtualisation and containerisation within advanced VPN scenarios — solutions for advanced computer networks and Virtual Private Networks
- Operations on deep web networks — solutions for engineering of non-public and anonymous networks and confidentiality of communication
- Operations on anonymous networks — solutions for engineering of non-public and anonymous networks and advanced communications confidentiality
- Data security
- Confidentiality of communication — solutions for communication in closed-loops and confidential exchange of volatile data — solutions for confidentiality of communication and advanced communications confidentiality
- Data encryption
- Data authentication — instrumentation for signing electronic mail and files, as well as supporting the european electronic signature standards
- Encrypting and self-encrypting functionality of Apple APFS filesystem — solutions for encryption and authentication
- Modular encryption schemes employing open-source solutions — solutions for encryption and authentication and advanced encryption
- Advanced security model
- Virtualisation and containerisation
- Basic virtualisation — simplified executions of applications designed for other platforms
- Compatibility and software abstraction with Crossovercommercial license
- Simplified virtualisation with Parallelscommercial license
- Advanced virtualisation — complete virtualisation for Apple Silicon/ARM64
- Virtualisation with VMWare Fusion
- Virtualisation with Oracle VirtualBox
- Virtualisation and hardware translation with UTM/Qemu
- Further solutions for virtualisation of systems and services
- Containerisation and modular work environment
- Docker containerisation framework with particular visualisation elements for macOS
- Basic virtualisation — simplified executions of applications designed for other platforms
- Corporate environment and Apple cloud
- Centralised management of Apple devices with Apple MDM framework
- Applied security and engineering of Apple cloud services
- Applied privacy and data synchronisation with Apple cloud services
BSD and Linux systems in personal computer specific configurations
- Ubuntu Linux for personal systems — extended application of solutions for secure server systems
- FreeBSD for personal systems — extended application of solutions for secure server systems
Production services and key server processes
Engineering, deployment, security and optimisation of key production services for BSD and Linux systems
Advanced secure work environments- Secure server systems — solutions for secure server systems and advanced filesystems and data storage
- Virtualisation and isolation of services — solutions for virtualisation of systems and services as well as isolation of services and processes
- Operations in secure environments — solutions for Virtual Private Networks, confidentiality of communication, advanced communications confidentiality as well as advanced filesystems and data storage
- Operations on volatile data — solutions for advanced filesystems and data storage, encryption and authentication as well as advanced encryption
- Web servers — service providing content over the HTTP protocol for any tasks, including up to complex tasks in cloud and cluster environments — solutions for WebOps NginxCaddyrelayd
- CGI environments — code execution environments closely cooperating with HTTP servers, usually providing logic for Web — solutions for PHP programming services and Go programming services PHPGo
- Database systems — production database systems, both RDBMS and non-relational, operating as autonomous services offering a wide array of functions and access methods MySQLPercona MySQLPostgreSQLSQLiteRedis
- Embedded databases — environments of database systems embedded into applications, software solutions or operating as parts of bigger architectures RocksDBLMDBBerkeleyDB
- Electronic mail servers — mail exchange systems, spam filtering and providing access to client applications OpenSMTPDPostfixRspamd
- Secure communication systems — secure text, audio and video communication systems, usually deployed in closed-loop settings — solutions for confidentiality of communication and advanced communications confidentiality SignalSimpleXMatrixIRC
- Cluster and virtualisation production systems — deployments of microservice containerisation and virtualisation in essential clusters and load balancing — solutions for virtualisation of systems and services DockerKVMbhyve
- Git repositories — code repositories and version control systems with Web interfaces — solutions for GitOps GitGitLabGiteagitolite
- Cloud frameworks — services enabling easy online data synchronisation and exchange — solutions for private and public clouds ownCloudSeafileSyncthingRclone
- Data sharing servers — systems of efficient high volume data sharing using secure high-performance SFTP and SCP protocols — solutions for advanced filesystems and data storage ZFSBtrfsOpenSSH
- Authentication servers — servers providing centralised system, user and process authentication, usually in DevOps environments SSSD
- DNS servers — nameservers configured for efficient and secure work in secure environments and with DevOps instrumentation Unbound
- SMB and NFS servers — services providing easy data sharing for local networks — solutions for advanced computer networks SambaNFS
Systems and services performance monitoring
Solutions for monitoring of code performance, infrastructure, network systems, virtualisation as well as services and processes
Performance monitoring with Prometheus- Performance metrics collection using exporters built into systems and applications, and third party open source software — solutions for secure server systems, production services and key server processes as well as virtualisation of systems and services
- Programming solutions for collection and delivery of performance metrics and code self monitoring — tasks for PHP programming services and Go programming services
- Data processing and detailed visualisation with Grafana
- In-house programming solutions for processing of data provided by Prometheus/PromQL — tasks for PHP programming services and Go programming services
Advanced filesystems and data storage
Management of storage systems for server systems and advanced workstations
ZFS copy-on-write server filesystem- Secure ZFS Boot Environments
- Native ZFS cryptography
- ZFS data management — export, replication and recovery of pools and volumes
- ZFS data integrity — redundant, ZRAID, mirroring and self-healing pools and volumes
- ZFS specialised applications — one-time pools and volumes
- Optimisation of ZFS structures in large scale deployments
- Hardware optimisation for ZFS arrays
- Environment optimisation for ZFS filesystem storing MySQL/PostgreSQL databases and other specialised services
- Operational differences between Oracle ZFS, FreeBSD ZFS and OpenZFS
- Btrfs data management — export, replication and recovery of Btrfs devices and subvolumes
- Btrfs data integrity — redundant, RAID, mirroring and self-healing devices and subvolumes
- Btrfs specialised applications — one-time devices and subvolumes
- Hardware optimisation for Btrfs filesystems
- Environment optimisation Btrfs filesystems storing databases and other specialised services
- Standard — operations on ext4, UFS, FFS, Hammer and (ex)FAT(32)
- Network protocol based — operations on and implementation of providers for NFSv3/v4 and SMB — solutions for DevOps as well as production services and key server processes
- Advanced operations and native cryptography of APFS filesystem
- Basic solutions for encryption and authentication and confidentiality of communication
- Advanced solutions for secure server systems, production services and key server processes, virtualisation of systems and services, private and public clouds, advanced encryption as well as advanced communications confidentiality
Advanced encryption
Advanced data encryption for server systems
Encryption systems for FreeBSD- Block device encryption
- geli — an advanced encryption systems based on the GEOM and crypto frameworks, operating as a block storage hardware abstraction layer. Fully integrated with ZFS and Boot Environments enabled bootloaders, it offers full disk encryption for the most complex scenarios, usually operating as a device provider for UFS or ZFS filesystems. Possibly the most sophisticated encryption system currently available.
- gdbe — an encryption system based on the GEOM and crypto frameworks operating as a block storage hardware abstraction layer, originally designed under a DARPA contract. Volumes encrypted with gdbe become distinguishable from volumes simply filled with random data, which qualities gdbe for very particular applications.
- Native filesystem encryption
- ZFS — encryption as a native ZFS filesystem feature compliant with the OpenZFS implementation, enabling on-the-fly encryption of ZFS datasets on physical and virtual volumes
- Block device encryption
- softraid (d:crypto) — an encryption system available as a softraid pseudodevice operating under CRYPTO discipline as a block device hardware abstraction layer. Integrated with the bootloader allows perfect full volume encryption, usually operating as a device provider for FFS.
- Block device encryption
- cryptsetup — an advanced encryption system based on the dm-crypt and LUKS frameworks, operating as a block device hardware abstraction layer. Advanced configurations offer full volume encryption supporting particular bootloaders. As a well developed and efficient encryption, it may be a device provider for OpenZFS or Btrfs.
- Native filesystem encryption
- ext4 — encryption as a native ext4 filesystem feature available for individual keyed file directories
- ZFS — encryption as a native ZFS filesystem (OpenZFS implementation) feature, enabling on-the-fly encryption of ZFS datasets on physical and virtual volumes
- Block device encryption
- (Oracle) ZFS — encryption of original Oracle ZFS driven by the Solaris Cryptographic Framework cryptography provider. ZFS on Solaris remains a commercial product and its closed source code is not available for an independent review
- Hardware encryption scenarios involving self-encrypting drives, often operating as the base layer for more advanced configurations
- Self-encrypting drives with individual security schemes
- Self-encrypting drives implementing the TCG OPAL standard
- One-time and temporary encryption and ciphers
- Active software and hardware protections of encrypted systems and volumes against physical third-party interference and seizure
Virtual Private Networks
Solutions ensuring secure communication between secure severs systems and networks
High performance secure IPSec links- IPSec for Linux/Unix systems and specialised networking hardware
- IPSec deployments along other encapsulation and tunneling protocols
- Solutions for advanced computer networks, secure server systems, virtualisation of systems and services as well as isolation of services and processes
- Optimisation, configuration and multiplex operation of access servers
- Wireguard links for secure networks and mobile clients
- Asymmetric cryptography based anonymous (or blind) wireguard links
- Special purpose wireguard solutions for secure servers systems
- Solutions preventing wireguard protocol blacklisting
- Solutions for advanced computer networks, confidentiality of communication and advanced communications confidentiality
- Virtualisation and ssh deployment as special purpose VPNs
- Secure data transport for server systems and specialised networking hardware
- Ssh as a secure authentication system for network resources
- OpenVPN based virtual private networks and links
- Cisco AnyConnect based virtual private networks and links
Engineering of non-public and anonymous networks
Engineering, deployment, security and optimisation of services for the non-public Internet (deep web) and the hidden Internet (darkweb)
Deep web networks- Engineering of server systems and work environments for deep web operations — solutions for secure work environments, advanced computer networks, secure server systems as well as Virtual Private Networks
- Engineering of specialised deep web services — solutions for production services and key server processes, private and public clouds, virtualisation of systems and services, isolation of services and processes, Virtual Private Networks, confidentiality of communication, advanced communications confidentiality, encryption and authentication, advanced encryption as well as advanced filesystems and data storage
- Engineering, cryptography and management of The Onion Router (TOR) anonymous network
- Engineering, cryptography and management of The Invisible Internet Project (I2P) anonymous network
- Deployment and optimisation of servers systems for anonymous network operations — solutions for secure server systems, virtualisation of systems and services, isolation of services and processes, production services and key server processes, encryption and authentication, advanced encryption as well as WebOps
- Deployment and optimisation of secure work environments for anonymous networks operations — solutions for secure server systems, virtualisation of systems and services as well as Virtual Private Networks
- Deployment and optimisation of secure anonymous network dedicated services — solutions for PHP programming services, Go programming services, code operations security, code data security, WebOps, secure server systems, production services and key server processes, virtualisation of systems and services, isolation of services and processes, security and privacy of blockchain architectures as well as programming solutions for blockchain architecture and cryptocurrencies
Secure work environments
Designing and deployment of secure work environments
Secure computer networks- Solutions for advanced computer networks and Virtual Private Networks
- Advanced security and performance configuration of Apple macOS — solutions for secure workstations and personal computers
- Solutions for secure work environments, virtualisation of systems and services, Virtual Private Networks, confidentiality of communication, advanced communications confidentiality, encryption and authentication as well as advanced encryption
- Advanced solutions for secure server systems, production services and key server processes, private and public clouds, virtualisation of systems and services, isolation of services and processes, advanced filesystems and data storage, Virtual Private Networks, confidentiality of communication, advanced communications confidentiality, encryption and authentication as well as advanced encryption
- Solutions for production services and key server processes, systems and services performance monitoring, virtualisation of systems and services, isolation of services and processes, advanced filesystems and data storage, private and public clouds, engineering of non-public and anonymous networks, encryption and authentication as well as advanced encryption
- Solutions for secure server systems, Virtual Private Networks, confidentiality of communication, advanced communications confidentiality engineering of non-public and anonymous networks, encryption and authentication as well as advanced encryption
- Solutions for DevOps, systems and services performance monitoring, GitOps and WebOps
Secure server systems
Advanced server systems delivering security and stability suitable for handling of virtually any task
FreeBSD server systemsAn advanced BSD Unix offering unique features. Server dedicated.
- System engineering
- Advanced installation and recovery
- Kernel and source code engineering — task specific system builds
- ZFS filesystem and boot environments — solutions for advanced filesystems and data storage
- Advanced debug and DTrace dynamic tracing
- Advanced system and services performance monitoring — solutions for systems and services performance monitoring
- Security
- Highly advanced secure setup
- IPFW i PF packet filtering
- Advanced routing, network encryption and management — solutions for virtualisation of systems and services and Virtual Private Networks
- Advanced multi-layer data encryption schemes — solutions for advanced filesystems and data storage, encryption and authentication and advanced encryption
- Advanced privacy features and anonymous networks support — solutions for confidentiality of communication, advanced communications confidentiality and engineering of non-public and anonymous networks
- Virtualisation and isolation of services
- Solutions for virtualisation of systems and services and isolation of services and processes
- jail isolation environments
- VNET and Netgraph network virtualisation
- bhyve and VirtualBox virtualisation frameworks
A legendarily secure system with a group of trusted daemons. Specialised deployments.
- System engineering
- Advanced installation and recovery
- Kernel and source code engineering — task specific system builds
- Advanced debug and btrace dynamic tracing
- Advanced system and services performance monitoring — solutions for systems and services performance monitoring
- Security
- Highly advanced secure setup
- PF packet filtering
- Advanced routing, network encryption and management — solutions for virtualisation of systems and services and Virtual Private Networks
- Data encryption schemes — solutions for advanced filesystems and data storage, encryption and authentication and advanced encryption
- Advanced privacy features and anonymous networks support — solutions for confidentiality of communication, advanced communications confidentiality and engineering of non-public and anonymous networks
- Virtualisation
- Solutions for virtualisation of systems and services and isolation of services and processes
- vmm virtualisation subsystem
An easy to use and versatile Linux. Universal and flexible use.
- System engineering
- Advanced installation and recovery
- Kernel and source code engineering — system imagining and customisation
- OpenZFS and Btrfs filesystems — solutions for advanced filesystems and data storage
- Security
- Easier secure setup
- iptables and UFW packet filtering
- Advanced routing, network encryption and management — solutions for virtualisation of systems and services and Virtual Private Networks
- Data encryption schemes — solutions for advanced filesystems and data storage, encryption and authentication and advanced encryption
- Advanced privacy features and anonymous networks support — solutions for confidentiality of communication, advanced communications confidentiality and engineering of non-public and anonymous networks
- Virtualisation and containerisation
- Simplified Docker microservice containerisation
- LXD service isolation and containerisation framework
- KVM/Qemu advanced virtualisation framework
- Other solutions for virtualisation of systems and services and isolation of services and processes
An advanced and powerful corporate closed-source Unix
- System engineering
- Advanced installation and recovery
- Original Oracle ZFS filesystem and Boot Environments — solutions for advanced filesystems and data storage
- Advanced debug and DTrace dynamic tracing
- Advanced system and services performance monitoring — solutions for systems and services performance monitoring
- Security
- Advanced secure setup
- PF packet filtering
- Advanced routing, network encryption and management — solutions for virtualisation of systems and services and Virtual Private Networks
- Native Oracle ZFS filesystem encryption schemes
- Cryptographic operations with Cryptographic Framework
- Virtualisation and isolation
- General and network virtualization and isolation with Solaris Zones
- General, network and kernel virtualization and isolations with Solaris Kernel Zones
- VirtualBox virtualisation framework
- Advisory services for purchasing, expansions and configuration of server systems and hardware
- Advisory services for peering analysis and datacenter choice
Isolation of services and processes
Engineering, deployment, security and optimisation of advanced containerisation and isolation of server services
Cluster and microservices containerisation- Simplified Docker containerisation systems for Linux and macOS
- Secondary containerisation services for Linux systems
- LXD isolation and containerisation system for Ubuntu Server
- VNET and Netgraph enabled jail isolation system for FreeBSD
- Solaris Zones and Solaris Kernel Zones isolation frameworks for Oracle Solaris 11
- Secondary isolation systems for Ubuntu Server, FreeBSD and OpenBSD
Virtualisation of systems and services
Engineering, deployment, management and optimisation of virtualisation provider systems and virtual machines
Engineering, deployment, specialised configuration, advanced security and optimisation of virtualisation systems and individual virtual machines- KVM/Qemu virtualisation for Linux systems
- bhyve virtualisation for FreeBSD
- vmm virtualisation for OpenBSD
- VMWare virtualisation framework for multiple systems
- VirtualBox virtualisation framework for multiple systems
- UTM/Qemu virtualisation for macOS and Apple Silicon/ARM64
- Complete encryption of virtual machines
- One-time and temporary encryption of special purpose virtual machines
- Solutions for secure server systems, isolation of services and processes, Virtual Private Networks, engineering of non-public and anonymous networks, advanced filesystems and data storage, encryption and authentication as well as advanced encryption
Encryption and authentication
Encryption and security of confidential and volatile digital data
Encryption and authentication of content, text and individual files- OpenPGP/GnuPG standard — a universal encryption and authentication system for content, text and individual files based on asymmetric cryptography, defined by the RFC 4480 and RFC 9580 standards and functioning as the de facto default system for software and code signing and encryption and authentication of electronic mail. In use for over 30 years, its security depends on the type of keys and algorithms chosen. The PGP standard encompasses direct exchange of public keys between communicating parties remaining independent of third-party trust services.
- S/MIME standard — a universal encryption and authentication system for electronic mail based on asymmetric cryptography, defined by the RFC 8551 standard. The S/MIME depends on a trusted third-party confirming the validity of certificates in use.
- Signify standard — a system of files and text authentication developed by the OpenBSD project based on asymmetric cryptography, intertwining ease of use with modern cryptography
- Operations on electronic signatures required by the eIDAS regulation — solutions for managing electronic signature standards of CAdES, PAdES and XAdES
- Programming solutions for automated and integrated management of electronic signatures — solutions for PHP programming services, Go programming services, code operations security and code data security
- Block device encryption
- Encrypting filesystems — particular modern filesystems offer encryption capability, often operating as a transparent user independent layer.
Example Apple APFS — a filesystem provided by recent versions of Apple macOS on-the-fly encrypting all data either as an automated Filevault component, or as a user configurable subsystem allowing more advanced configurations. Encryption capabilities of both the Apple Silicon and the APFS filesystem may be an effective basis for a more complex data security scenario. APFS remains a closed-source commercial product. - Cryptographic containers and modular volume encryption — systems of simpler block encryption, effectively encrypting full volumes and maintaining virtualised cryptographic containers, usually open-source allowing independent security reviews.
ExampleVeraCrypt — a modern fork of TrueCrypt
- Encrypting filesystems — particular modern filesystems offer encryption capability, often operating as a transparent user independent layer.
- Encrypting stack filesystems — solutions for stack filesystems operation at the user level, most often used to securing particular pools of data
ExampleeCrypFs for Linux or EncFS available on several platforms - Cloud-optimised data encryption — encryption systems by design optimised for deployments in third-party clouds and data exchange systems
Examplegocryptfs or cryfs available on several platforms
Advanced computer networks
Engineering, deployment, security and optimisation of secure high performance computer networks
Secure local networks- Network management
- Active security of wired and wireless networks — network gateways, packet filtering and active network traffic management and profiling
- Advanced management of Internet access endpoints on own hardware and software
- Advanced network infrastructure
- Wired networks
- Ethernet networks with throughput up to 10 Gbit/s
- Local networks requiring secure access authentication
- Ethernet encryption
- Wireless networks
- Standard WiFi 6 and 7 wireless network
- High performance wireless networks with throughput up to 2.5 Gbit/s
- Multi-layered wireless network encryption
- Wireless networks access authentication systems
- Networks providing complete Ubiquiti Unifi functionality
- Wired networks
- Network peripherals
- Ethernet oriented Network Attached Storage (NAS) disk resources
- Printing servers and networked printers
- Multi source and redundant power management for the whole networks
- Secure communications and exchange of data
- Secure online communication — solutions for confidentiality of communication, advanced communications confidentiality as well as Virtual Private Networks
- Secure exchange of data — solutions for private and public clouds
- Engineering of deep web networks — solutions for engineering of non-public and anonymous networks
- Engineering of anonymous networks — solutions for engineering of non-public and anonymous networks
- Network modularisation and virtualisation
- Virtual, isolated and multi-layered networks ready to enforce strict access permissions
- Secure remote access to local networks — solutions for Virtual Private Networks
- Advanced server systems and services — solutions for secure server systems and production services and key server processes
- Solutions for Virtual Private Networks
- Solutions for virtualisation of systems and services and isolation of services and processes
- Programming services for blockchain architectures and cryptocurrencies — solutions for security and privacy of blockchain architectures and programming solutions for blockchain architecture and cryptocurrencies
Private and public clouds
Engineering, deployment and management of private and public cloud services
Private clouds- Resource readiness for private clouds — solutions for advanced computer networks, secure server systems, production services and key server processes, virtualisation of systems and services, isolation of services and processes, Virtual Private Networks as well as advanced filesystems and data storage
- Solutions for private clouds and data sharing within organisations — solutions for advanced computer networks, Virtual Private Networks, encryption and authentication as well as advanced encryption
- Secure private clouds — solutions for Virtual Private Networks, confidentiality of communication as well as advanced communications confidentiality
- Non-public and deep web secure private clouds — solutions for engineering of non-public and anonymous networks
- Programming services for private clouds infrastructure — solutions for PHP programming services and Go programming services
- Resource readiness for public clouds — solutions for secure work environments, secure server systems, production services and key server processes, virtualisation of systems and services, isolation of services and processes, Virtual Private Networks as well as advanced filesystems and data storage
- High performance clouds and public access to high volumes of data — solutions for advanced computer networks and advanced filesystems and data storage
- Programming solutions for public clouds — solutions for PHP programming services and Go programming services
- Solutions for GitOps and WebOps