Skip to content

Commit

Permalink
search design and some content
Browse files Browse the repository at this point in the history
  • Loading branch information
lkleuver committed Oct 21, 2023
1 parent 62369b1 commit a138e67
Show file tree
Hide file tree
Showing 43 changed files with 1,050 additions and 345 deletions.
708 changes: 391 additions & 317 deletions admin/config.yml

Large diffs are not rendered by default.

4 changes: 4 additions & 0 deletions assets/icons/chevronleft.svg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
4 changes: 4 additions & 0 deletions assets/icons/chevronright.svg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
4 changes: 4 additions & 0 deletions assets/icons/email.svg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
4 changes: 4 additions & 0 deletions assets/icons/search.svg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added assets/images/global/codeofconduct_header.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
115 changes: 115 additions & 0 deletions assets/scss/core.scss
Original file line number Diff line number Diff line change
Expand Up @@ -132,4 +132,119 @@ a.cta {
}
}
}
}


.partner-card {
border-radius: 20px;
overflow: hidden;

figure {
background-color: white;
height: 200px;
overflow: hidden;
img {
max-width: 100%;
}
}


section {
padding: 20px 16px;;
background-color: black;
color: white;
}
}


.partner-list {
display: grid;
grid-template-columns: 1fr 1fr 1fr;
grid-gap: 32px;
}

.newsroom {



.newsroom-article-list {
display: grid;
grid-gap: 32px;
grid-template-columns: 1fr 1fr;
grid-template-rows: repeat(4, 400px);
}


.highlight {
grid-row: 1 / 3;

background-color: green;
}

.article {
background-color: gray;
}
}



button, .button {
background-color: black;
color: white;
border-radius: 24px;
border: 0;

font-family: 'Open Sans';
font-style: normal;
font-weight: 700;
font-size: 14px;
line-height: 16px;
letter-spacing: 0.02em;
text-transform: uppercase;

padding: 4px 16px;

display: flex;
justify-content: space-around;
align-items: center;

&.primary {
color: #000;
background-color: var(--brand);
}

&.inverse {
background-color: white;
color: black;
svg {
fill: black;
}
}


svg {
width: 15px;
height: 15px;
margin-right: 6px;
margin-top: 1px;
fill: white;
}
}

ol {
list-style: outside;
list-style-type: decimal;
margin-left: 20px;
padding-left: 10px;

li {
margin-bottom: 10px;

ul {
list-style: circle;
li {
font-size: 1em;
}
}
}
}
32 changes: 31 additions & 1 deletion assets/scss/ui/nav.scss
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ nav.nav-container {
padding-left: var(--rest);
display: flex;
align-items: center;
justify-content: flex-start;
justify-content: space-between;

figure {
flex: 0 0 120px;
Expand All @@ -31,6 +31,7 @@ nav.nav-container {

article {
display: flex;
flex: 1 1 auto;
a {
padding: 0 24px;
color: #fff;
Expand Down Expand Up @@ -66,6 +67,35 @@ nav.nav-container {
}
}
}

aside {
flex: 0 0 400px;
color: white;

display: flex;
align-items: center;

button {
margin-right: 8px;
}


section {
padding-left: 8px;
span {
color: var(--brand);
}

a {
text-transform: lowercase;
color: white;

&:hover {
text-decoration: underline;
}
}
}
}
}

.sub-nav {
Expand Down
11 changes: 11 additions & 0 deletions content/newsroom/_index.en.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
---
title: Newsroom
opener: Welcome to the DIVD newsroom
intro: We are a group of volunteers that scout the web for potential cyber
security risks.
newsletter: https://divd.nl/newsletter
starter:
title: Stay up to date
description: Here you can find updates, articles about our culture, cases and much more!
highlight: /newsroom/articles/test-article-with-image
---
9 changes: 9 additions & 0 deletions content/newsroom/_index.nl.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
---
title: Newsroom
opener: Welcome to the DIVD newsroom
intro: We are a group of volunteers that scout the web for potential cyber
security risks.
starter:
title: Stay up to date
description: Here you can find updates, articles about our culture, cases and much more!
---
5 changes: 5 additions & 0 deletions content/search/_index.en.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
---
title: Search
outputs:
- json
---
5 changes: 5 additions & 0 deletions content/search/_index.nl.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
---
title: Zoeken
outputs:
- json
---
33 changes: 33 additions & 0 deletions content/what-we-do/code-of-conduct/_index.en.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
---
type: codeofconduct
title: Code of Conduct
---
## CODE OF CONDUCT 2.1

1. DIVD is a Dutch research institute that works with volunteers who aim to make the digital world safer by searching the internet for vulnerabilities and reporting the findings to those who can fix these vulnerabilities.
2. As we work on sensitive data, gathered without informed consent, we established this Code of Conduct to provide an ethical base for the work we do. This code can also be used by other researchers working on what is currently referred to as responsible disclosure, or coordinated vulnerability disclosure.
3. In our research projects we, for example:

* Scan the internet for vulnerabilities, mostly Common Vulnerabilities and Exposures (CVEs), and report our findings and possible solutions to the owners of these systems.
* Analyse online systems for new vulnerabilities (zero-days), report our findings to the makers and try to help them out in fixing the vulnerabilities.
* Analyse databases with leaked credentials and report to the organisations or people who are compromised to take appropriate measures.
* Work with trusted partners to extend our reach and notify as many organisations and people as possible
4. We are aware that we operate at the edges of what is legally allowed, so we proceed by these three criteria commonly used in court cases on vulnerability disclosures:

* Societal need: we do vulnerability disclosure to prevent online damage to as many internet users as possible and don’t serve any particular financial, political or individual interests.
* Principle of Proportionality: we serve this need with appropriate means. Our research should increase and not decrease the integrity and availability of online systems.
* Principle of Subsidiarity: if several means are available to meet the need, we opt for the one which has the least impact.
5. We validate our findings to prevent reporting false positives or miss false negatives and sometimes need to verify if a vulnerability is actually present. We use custom-made scripts based on publicly available proof of concepts or non-weaponized exploit code and take good care that we don’t damage systems, download too much personal data, or create backdoors.
6. Our findings typically consist of lists with several to millions of IP addresses, the type of vulnerability found, contact information, and metadata (e.g. timestamps, scripts, researchers working on the data). This is sensitive data, so we take all precautions necessary to protect the confidentiality of this data.
7. We disclose zero-day vulnerabilities to the vendor first, then request CVE numbers and negotiate a reasonable time span for disclosing it to our Trusted Information Sharing Partners and the broader public. Ideally, the disclosure is preceded by a patch. If a vendor is obviously slow in providing the patch and it is likely others may discover and abuse the vulnerability, we may consider disclosure to warn potential victims and advise them on mitigation measures.
8. We report the CVEs we find to the owners of the systems, mostly by generating email addresses based on their domain name, such as info@, security@ or abuse@ and to the listed abuse addresses of IP owners. We may also send them our findings through our Trusted Information Sharing Partners, who are, for example, Computer Emergency Response Teams, Computer Security Incident Response Teams, Internet Service Providers, governmental organisations or other research institutes.
9. We analyse online threats, not threat actors. We are researchers and don’t serve the needs of governments or law enforcement.
10. After reporting our findings, we repeat our scans to track progress. We, therefore, need to store data and log our activities. We may also need this data in case of a dispute. We minimize the amount of personal data we gather and store and are aware that an IP address can also be perceived as information relating to an identified or identifiable natural person. We believe that our processing of this data is proportional to our aim to protect much more sensitive personal data in the systems at stake.
11. During our research, we inform the broader security community and the media about our findings only on a statistical basis: just numbers, no names, or other identifiable information. We close all research projects with a report, which can be downloaded from divd.nl and is under Creative Commons Licence.
12. We only report vulnerable systems. Patching or other mitigation is solely the responsibility of the owner.
13. DIVD is responsible for making researchers aware of these rules, while it is the responsibility of each researcher to stick to them. If they don’t, the board will take appropriate measures, for instance by revoking their DIVD account.
14. This Code of Conduct will also be used as an ethical guidance for our DIVD Academy, shared with the broader security community and updated regularly. Suggestions and feedback are welcome. Contact our ethical committee [[email protected]](mailto:[email protected])

## MORE INFO:

Is it legit to exchange lists of IP addresses together with vulnerabilities? The short answer is: Yes, according to Dutch law we can. The more elaborate answer you will find in this Liability Impact Assessment, prepared by Privacy Management Partners (in Dutch). [Click here to download](https://www.divd.nl/assets/downloads/LIA_abuse_informatie_v1.1.pdf) (Dutch)
7 changes: 7 additions & 0 deletions content/what-we-do/code-of-conduct/_index.nl.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
---
type: codeofconduct
title: Code of Conduct
---
# Hello world

code of conduct NL
Original file line number Diff line number Diff line change
@@ -1,4 +1,5 @@
---
type: team
title: The Team
teams:
- title: Supervisory board
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,5 @@
---
type: team
title: Het Team
teams:
- title: Supervisory board
Expand Down
4 changes: 4 additions & 0 deletions content/who-we-are/team/people/_index.en.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
---
type: people
title: People
---
4 changes: 4 additions & 0 deletions content/who-we-are/team/people/_index.nl.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
---
type: people
title: People
---
Original file line number Diff line number Diff line change
@@ -1,4 +1,5 @@
---
type: people
name: Arthur Dent
role: ZIEZO
bio: Always bring a towel
Expand Down
Original file line number Diff line number Diff line change
@@ -1,3 +1,4 @@
---
type: people
bio: Neem altijd een handdoek mee.
---
8 changes: 4 additions & 4 deletions hugo.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,13 +6,13 @@ defaultContentLanguageInSubdir: false
languages:
en:
disabled: false
languageCode: en-US
languageCode: en
languageDirection: ltr
languageName: English
languageName: EN
weight: 1
nl:
disabled: false
languageCode: nl-NL
languageCode: nl
languageDirection: ltr
languageName: Nederlands
languageName: NL
weight: 2
5 changes: 5 additions & 0 deletions justfile
Original file line number Diff line number Diff line change
@@ -1,3 +1,8 @@
build:
npm install
hugo
npm run postbuild

admin:
npx netlify-cms-proxy-server &
python3 -m http.server --directory ./admin &
Expand Down
22 changes: 22 additions & 0 deletions layouts/codeofconduct/list.html
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{{ define "main" }}

<div class="article-layout">

{{ partial "p/layout_open" (dict "classes" (slice "default")) }}
{{ partial "breadcrumbs" . }}

{{ with resources.Get "images/global/codeofconduct_header.png" }}
{{ partial "tools/rimg/img" (dict "img" . "alt" "Code of conduct") }}
{{ end }}

{{ partial "p/layout_close" }}
{{ partial "p/layout_open" (dict "classes" (slice "article")) }}


{{ .Content }}
{{ partial "p/layout_close" }}


</div>

{{ end }}
2 changes: 1 addition & 1 deletion layouts/contribute/section.html
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,7 @@ <h2>{{ .Params.appreciate.title }}</h2>
{{ partial "tools/rimg/img" (dict "img" . "alt" "DIVD Yay!") }}
{{ end }}
</div>
<div>
<div id="donate">
<div className="block">
<h3>{{ .Params.donatesupp.title }}</h3>
<p class="pre">{{ .Params.donatesupp.description }}</p>
Expand Down
Loading

0 comments on commit a138e67

Please sign in to comment.