- AEAD payloads
- Perfect forward secrecy
- No payload visibility
Zero-knowledge dataplane
Negotiations are ephemeral peer-to-peer; control plane sees handshakes — never customer traffic content. Mirrors classification-friendly “encrypt-then-route” doctrines.
Session material stays in volatile memory wherever your policy mandates; disks hold configuration and attestations—not flow payloads—so subpoena timelines face cold storage gaps by design rather than narrative.
Identity and entitlement live in planes that cannot satisfy both “prove uptime” SOC asks and bulk surveillance—handshakes and route health sync without furnishing session content to operators or auditors.
- Per-tunnel rekey windows aligned to your risk register (compromise signal, policy clock, or manual rotation).
- Exports cover cipher suite, endpoint posture, and tunnel state—not URLs, DNS payloads, or application bytes.
Primitives ChaCha20-Poly1305 · AES‑GCM suites · PQ profiles on roadmap
Protocol bindings →