Security & Privacy

Enterprise-grade protection with code signing and verified downloads

Code Signing & Verification

All StreamShield downloads are digitally signed and verified to ensure authenticity and integrity.

SHA256 Checksums

Every download includes a SHA256 checksum file for verification. This ensures the file hasn't been tampered with during transmission.

Windows Desktop: 979e4211d725ae50...

Code Obfuscation

Browser extensions are minified and obfuscated before distribution, protecting our intellectual property while maintaining functionality.

Secure Downloads

All downloads are served over HTTPS with TLS encryption. Our server uses modern security protocols to protect your download.

Privacy-First Architecture

StreamShield is designed with privacy as the foundation. We don't collect, store, or transmit your browsing data.

  • Local-Only Blocking: All ad blocking and filtering happens locally on your device. No URLs or page content are sent to external servers.
  • No Telemetry: We don't track which websites you visit or what you block. Your browsing data stays on your device.
  • No Account Required: Use StreamShield without creating an account. No personal information is needed.
  • Open Source Transparency: Our code is available for audit on GitHub. Verify our security claims yourself.
  • No Phone Home: The software never sends data back to our servers except for:
    • Checking for updates (opt-in)
    • Fetching filter list subscriptions
    • Premium license validation (encrypted, one-time)

Premium License Security

Premium features are protected through encrypted license validation with the following security measures:

  • Encryption: License keys are encrypted using AES-256 encryption
  • Local Validation: License validation happens locally on your device
  • No Personal Data: Licenses are not tied to personal identifiable information
  • Hardware Binding: Optional hardware binding for enterprise licenses
  • Offline Mode: Once validated, premium features work without internet connection

Download Verification

How to verify your downloads:

  1. Download both the file and its .sha256 checksum file
  2. Open a terminal/command prompt
  3. Run: certutil -hashfile filename SHA256 (Windows) or shasum -a 256 filename (Mac/Linux)
  4. Compare the output with the checksum file contents
Example verification (Windows):
certutil -hashfile StreamShield-Setup-5.1.0.exe SHA256

Expected output:
SHA256 hash of StreamShield-Setup-5.1.0.exe:
979e4211d725ae50 2778e5a48d1f9e3c f88e9c4e2942d

Security & Bug Bounty

We take security seriously. If you discover a security vulnerability, please disclose it responsibly:

  • Encrypt your report: Use our PGP key for sensitive findings
  • Email: [email protected]
  • Response Time: We aim to respond within 48 hours
  • Bug Bounty: Eligible vulnerabilities may qualify for rewards

Security Best Practices:

  • Always download from official sources (dirtysouthalpha.com or GitHub releases)
  • Verify checksums after download
  • Keep your software updated for the latest security patches
  • Never share your premium license key publicly
Back to Home