K8S Integration

Integration of the np:// protocol into the Kubernetes to establish Zero Trust overlay network for multi-tenant data exchange.

GitLab K8S Repo
Main Protocol

Main protocol definitions and reference implementation of it. Also includes a cryptographic verification based on Verifpal.

GitLab np:// Repo
GUI / Frontend

Simple GUI frontend to allow the usage and administration of installations.

GitLab GUI Repo

Welcome to the digital home of Neuropil.org

Open Source ZeroTrust Data Access made easy!

Tutorial

Take the first steps to exchange data between any kind of peers.

In our tutorial we use three different participants to exchange data. Enjoy the power of end-to-end encrypted data exchange without touching any cryptographic primitives. Everything you need is already bundled for you.

With our core setup we will teach you how to setup a relay and attach sender and receiver entities. Additional example code can be found in our repository, e.g. a VPN implementation, a privacy relay and our obfuscation cloud example!

Go to our tutorial
Neuropil® CyberSecurity Mesh

Dynamic exchange and protection of data with security and privacy by design!

The dynamic exchange of information between entities continually raises concerns about authorization and access control over data. In particular within the realm of IoT, old paradigms are used which, from a security perspective, offer little to no value. Often closed systems arise, and the usage and sharing of data becomes difficult. Additional project and integration costs are a direct result of delays in connectivity. Data quality, data transparency, and data sovereignty of users, companies, and organizations suffer as a result of this.

The Neuropil® CyberSecurity Mesh ensures data quality, data transparency, and data sovereignty all the while reducing IT costs, maximizing availability, and increasing reliability. The open source solution establishes secure communication path between users, applications and devices. This happens in dynamic, decentralized and fully automated way.

Documentation

Learn more about core concepts, projects and protocol details

The Neuropil® CyberSecurity Mesh provides the following features out of the box:

  • Automatic discovery of data channels across enterprises
  • Attribute based access control to authorize data exchange
  • Asymmetric end-to-end encryption between the participating systems
  • Protection of IoT devices regarding excessive payloads
  • High scalability without central infrastructure
  • Centralized governance, but decentralized messaging
Go to our documentation