Disclaimer

Cookies

House of Pertijs uses cookies and web statistics. Below you can read why. And you can see exactly which cookies House of Pertijs places and for what purpose.

What kind of cookies does House of Pertijs use?

House of Pertijs uses cookies for web statistics.

Tracking cookies

Tracking cookies are cookies that can follow visitors while surfing other websites. House of Pertijs does not use tracking cookies. The website therefore does not support the DoNotTrack setting of browsers. House of Pertijs complies with the applicable European legislation.

Cookies for web statistics

House of Pertijs uses cookies for web statistics. For this purpose, House of Pertijs uses the open source web analysis package Piwik. House of Pertijs analyses this data. This allows the website to be even better tailored to visitors. House of Pertijs does not use the collected data for any other purpose than improving the website. The table below shows which cookies these are.

These types of cookies do not impact your privacy. They therefore fall under the exception of the cookie provision in the Telecommunications Act.

Cookie name Goal
houseofpertijs Keeps track of whether a visitor has previously visited the site via the computer and contains the (login) session key

Responsible disclosure policy FYN Software

Short version

If you discover a vulnerability in one of FYN Software's systems, we would like to know. know so we can fix the problem. If you promise not to exploit the vulnerability, then we promise not to file a report. You will receive a delicious apple pie as a reward and If we decide to make the vulnerability we find public, we will do so in consultation with you.

Longer version

FYN Software pays a lot of attention to security. That is precisely why we realize that no system can be guaranteed to be 100% secure, so we take into account that in our systems may contain vulnerabilities. Because of the importance we attach to security For our users, we would like to hear from you if a vulnerability is found in our systems. The responsible disclosure policy consists of a number of agreements to which FYN Software and the the finder of the vulnerability must adhere to.

What does FYN Software do?

We investigate every report and always respond to a report.
We will respond to a report within one working day and process the finder's details confidential.
If there is indeed a vulnerability, we will then keep in touch about a reasonable solution recovery period.
If we decide to disclose the vulnerability we have found, we will do so in consultation with the finder. We hereby give public recognition to the finder, if the finder so wishes.
FYN Software will not file any charges for computer hacking when this guideline is followed and we will do everything in our reasonable power to prevent the finder from being prosecuted will be.
We will send the finder a delicious apple pie as a thank you and include the finder in the FYN Software hall of fame.
Justified reports of vulnerabilities are included in FYN Software's Annual Privacy Report.

What does the finder do?

The finder acts in good faith, is responsible for his own actions and makes no promises to exploit the vulnerability found.
The finder shall not act in a disproportionate manner. By this we mean that the finder:
may not use the vulnerability further than is strictly necessary to address the vulnerability to show;
will not copy, modify or delete any data on the applicable system;
will not make any changes to the system in question;
will not allow others access to the system in question;
The finder reports the found vulnerability only to FYN Software (and not to other parties), by sending as much information as possible, with which the vulnerability can be reconstructed. These may include: logs, IP addresses, URLs, timestamps, screenshots, etc.
The finder may report anonymously. For follow-up contact we do need a valid email address.

How to report?

Please report vulnerabilities in FYN Software systems to disclosure@fyn.nl . Use where applicable possible encryption. Our public key is below, and can also be found on the usual PGP key servers, our key ID is 0x051F0D6F5600D86B (4096 bits RSA key, created on 29-08-2016), and the key fingerprint is:

Key fingerprint = 8679 6DD8 18C0 489B 252D E7A7 3866 EDD3 108A FFC1

The key can be retrieved most easily via:

gpg --recv-keys 0x051F0D6F5600D86B

Below is the full public key:

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v2

mQSuBFfD7NwRDACPbKjeaHXa7XEpTviAwZcBmeDEn3QQbqmhUYMhv+mKcM98iwYq hcYGe6ZCV+tYHLuS45p8aMIVSMtDXkUxbAi4WirpDbUGuvZKShA2m9ut2mNgjgde 4V+5tpPv/M5UzjXnFGABS/pWUF68tB/cFJc3cktdrhPiDP1am8Ul+KnV/pWJ3NoR 80NpQuU+C9pjfn84zASCEb5//FLx1tQUmPV2qf6C1utyHb7nYbPEECFaF91HbpPC HNV/2VAEDywDvo8nmFwXiRiPo/ilXEIEFCvsgn58NgCnctyFVDjssoDq9+3hCDBA jfbCUtq2aIXKkU5j3gsJOmLNI0YlnG4LAKZhRS78ZCT1bIiO2+Hs9thKxQr/Sg1o RFlgiY6KyPokRQxZ0N4t5zoIgR6FzyYwWS+k5sRENtPmfEFZa3JGfPv/mocRRMyH 9se7A3EB0JWjMUFJQq0o2+Bl34PD492lK3onhfDVqt+cexKCiGONe64Y9eEaM+pU 1znofsralkOkKCsBAJGXnQ078/7R+YVOobybVEUNrJgQ3lwRtnrsN6XH9cr/C/4/ YdK8/bYZMgxxhU5g8SEqsYP3X0AMMUo5afxshgCh2XEyfpdzN6nAtl84OoXlbjw/ uYXojf6rPQ3jdc2ZgIAn8TUBtEnesAnmfAgIp68fhucmRph3II8AoOFlAcD+CoOe 0jhPYaJREePa6yaKr5V6rOYkr3MLAIer8vRUFMqakVzwpcJ+HdwrBNL5eemW7zVV Ms2n+AHzNnXdhYahR4KZYBuVZDA6kTtuxsfkTGMPjLJJ5Wokd8rOK4kkU5hefRN9
FsntxpyiMp4MnpEhTms9Tnj/Q7oHbM1CfqUjeKxPDeXq3xGxem9S3z1/KvfTuZRz T1kBPjRlvsVW333iWAzvi3ZFMwG/1P9BZltZbEp0/32YHNRuiB7v4nWnqqJYErdY E02s+8nKNetnStBPcZOiuK0Ftq0HYsUAFO5EFOL7AGhAIAmw4YXQ0JGHsv4hILsL pWMdSWhUnvzxKfIOklJf1w2qegkg/zk5PWzZvHTAawRjxQ84WcYT5BTWA7cv640L /0skOfad1GwoZUDiQbYd9Yrhlu3WwRFQfify6PRmiW62/KaqMkjpFLimwEEbSag8 7reyKPZMCL6oWGcKX3DK+1l9g6Zfff09NCo5oWeGwdux2BmPynCI7uR3qDv4uNdY fkr6yuQIMbqlgYSgkPYTX/wPT8CGRXDTigWow5Z1/b/n/MYcB5EZazybRTkbFaM0 fy1BMmPm/U3bxDt+pb7kSDOFcxES3FBVa9TDAMqpzFO8quxXg6BpsKbv3JUHkPdA JWbOTPSsLV0ITr8smVAe1vMyNu3iMlVDQQYzBxzL0OUwOp+BgkaWpOC3AQMSeuzo 1MHOMeAbIe71Xdjdbl42sN/qpGwmrp/7p4J0T6nxvOvZFHFK6HeWYGMsLhJ9gLpP iJEZARf6FfPPKxgK3hm98z1FLBUBzPFZzLaE+avuql2X6QCwZ+6YpXiokejbhTaB vcKzEqqsP8kX8Y0jask7WfC1uyQVsZvfzWJ3ZmkbOTiKjNQ4DUdgDgk+BdFqGgwO V7QxRllOIEF1dG9tYXRpc2VyaW5nIDxyZXNwb25zaWJsZWRpc2Nsb3N1cmVAZnlu Lm5sPoh7BBMRCAAjBQJXw+zcAhsjBwsJCAcDAgEGFQgCCQoLBBYCAwECHgECF4AA CgkQOGbt0xCK/8GT7wD/Q8/0tTEx9GekYAwiM7LESzRl1uOyFpDfNrwZnWU0gH0B AIbmnMN92UJkXBpAfQ3XB9kWb4qt4U6scTv2ckZsTavaiF4EEBEIAAYFAljCev8A CgkQeqMBJHrxPw9KxAD9GKI2n574sPVMOy2t8tFlNzCRkedRS4zSWqTm8oSbThkA /26qE6s7+/GbTusbIb6rF5f/5pHfU7yyBzOkZmI+k/TwiF4EEBEIAAYFAljCexoA CgkQ1WGPow2zV2cJuQD+LGF6EJPBW6lPBG5F58C3OulJV2arV92u7wpP+ONN7f4A /1wJPNvp251wcy17AkKBVv8dLUfwr9sq2MAkALjmK4/zuQMNBFfD7NwQDACTLyRU 8XCsmww60UGYUucZm067yOFfYWRhWs1sqrIRlfON+9QqJ10die28xM95U+G14of5 vvR8A0bWvwt9aQ5W4UoG9EcgXoOR6fYW0bMcr31GimWc5LRmBng4r+Lc5XF7GIkS A96e2urWPGJd9KVIKtOOx/osOqPSLyIb67CN0HuKBe4j5brJLCW4VvIWYYPp77JY /ROP2RbEJoaSqgK3cIWNCnhhYdjY/L6675F3ifvJ+QI6oaORF3yZ5QEla0kHcg63 4JduQrUKx/MTdm01govWZY05wm4QnKddAZFoBG8GFYxopCifPP5ghVy1hSmQh58k 8juR3qpcK7zUi0hTQvgIvWB11d8HQbnr7oC3x8wLLUpDS4zk+rWkQEHFa1AXOiud SF4Zxe2pm8FNqvLE7CXCHfT6peUTY0S38aYKid57BGInknjo0hIqWL1SL6z4G586 ddnhjdFG+PAEIdWHmmRrE9+FFbjEDPb85LDgd7hSZnGjKT9oDIR7Sq77WlcAAwUL /0lAjgSs54wCycVn7xHMYUeAVll3jxMYWu7kNXgX4nodVXsR3ee4ZxzUuLXNcwL8 KIaOzZD9+5IarGqFlByxa+2NNg8f3JkxTHOTzIFf+ZHPS7GFoRuUsGxEe2eBBNGI mVOg+ZB5+rhQbFECFS96p9fAHXRVfY/30ORXek2UWyXOPZtmL1N52LL78AjUZuZ9 x4Hjlkd63udE/tkbZeDl5CCL1qBIiJDZWJfqf8Al2P5evydIhMPnehcnzXPHPSm7 il1JYBzLrAXEx+z2hx6ZVY/Qbc5ky9Lnu+IcoeOXTt8mrvgPvCBPv/DcJXHI6YJs 0cXbihOp5BMRhRBIqWYGlfdSiEJpRiOsB1QmrthTeJoDoqlVt12uXA2ylCdn93Wl DeplayAMgv29yV05HfeXfbi10RivjQ+FVa2Kx4jnMxx5L+xcYDVly946hXFbc9Zg NhjpT3MbOMkBBpCIneTkJ/kA4Tz2O7guU8ioZbIESB5nBsvY88X6GR8zm8b/LmmL 2IhhBBgRCAAJBQJXw+zcAhsMAAoJEDhm7dMQiv/B7+cA/jFntYpypClN1BNqYukV 9Hg+0FaRLKSny8eso2+go5l7AP47hjckRhfrHxkVZt4pyO+5feMSXlchHXTobhpM K0/g8w==
=ekz5
-----END PGP PUBLIC KEY BLOCK-----

If these guidelines are not met

If our systems are breached without adhering to this guideline, FYN Software will always file a report.