Lightbox

Security Overview

The integrity of our website is of central importance to us, and we have designed peterwalkenhorst.com from the ground up with security in mind.

We follow international best practices to protect our operations and your data, and are continuously improving our safeguards as threats evolve.

This overview reports on some of the measures we are taking to make your browsing experience worry-free.

Data Protection

We use secure transport protocols and modern browser security controls to prevent any tampering with data while in transit.

In particular, all communication between your browser and our server is handled using encrypted HTTPS with recent Transport Layer Security protocols (TLS 1.2 or higher).

Moreover, we enforce HTTP Strict Transport Security (HSTS), so that browsers can only connect to our server over secure channels. Hence, the risk of protocol downgrade and man-in-the-middle attacks is substantially reduced.

Concerning security on the client side, we implement a Content Security Policy (CSP), so that unauthorized scripts can not be executed in your browser and cross-site scripting (XSS) attacks are prevented.

With respect to email communication, we use several authentication mechanisms to reduce the risk of spoofing or phishing attacks when sending or receiving messages.

We verify outgoing messages by using SPF (Sender Policy Framework) and DKIM (Domain Keys Identified Mail). This ensures that the messages are properly encrypted, and that only our server (and not spam-bots) can send email on behalf of peterwalkenhorst.com.

In addition, we implement MTA-STS (Message Transfer Agent - Strict Transport Security) to assure that mail connections are secure and that no downgrade attacks can happen during mail transport. This helps us to establish that the messages we send and receive are authentic and secure.

Infrastructure Security

Our hosting and delivery infrastructure adds additional layers of protection to ensure reliable, fast, and secure service.

The site is maintained at Hosting.com and benefits from regular server monitoring, security patching, and configuration hardening. Moreover, our hosting provider offers automated backups and disaster-recovery so as to reduce the risk of data loss.

In addition, we use the Cloudflare content delivery network, which provides for enhanced security at the edge.

Cloudflare notably implements a Web Application Firewall to manage Bots and block malicious traffic, protects against Distributed-Denial-Of-Service attacks, and enables secure DNS resolution.

Compliance

We aim to meet or exceed regulatory requirements for personal data protection.

In particular, we process personal data in line with the EU's General Data Protection Regulation (GDPR), as well as the California Consumer Privacy Act (CCPA). This concerns access, rectification, processing, and deletion of your data.

Please see our Privacy Policy for more detailed information about how we collect and use personal data.

Vulnerability Disclosure

We welcome responsible security research and corresponding vulnerability reports. If you discover a security flaw in our system, please refer to our Vulnerability Disclosure Policy and the communication channels and processes mentioned therein.

Contact Us About Security

If you have any questions about this Security Overview or how we protect your data, please get in touch through the contact form on this site.

Policy Update

This security overview will be revised if our security measures evolve.

Last update: 2025-12-09.


]