Integration of the np:// protocol into the Kubernetes to establish Zero Trust overlay network for multi-tenant data exchange.
Main protocol definitions and reference implementation of it. Also includes a cryptographic verification based on Verifpal.
Simple GUI frontend to allow the usage and administration of installations.
Open Source ZeroTrust Data Access made easy!
Take the first steps to exchange data between any kind of peers.
In our tutorial we use three different participants to exchange data. Enjoy the power of end-to-end encrypted data exchange without touching any cryptographic primitives. Everything you need is already bundled for you.
With our core setup we will teach you how to setup a relay and attach sender and receiver entities. Additional example code can be found in our repository, e.g. a VPN implementation, a privacy relay and our obfuscation cloud example!
Dynamic exchange and protection of data with security and privacy by design!
The dynamic exchange of information between entities continually raises concerns about authorization and access control over data. In particular within the realm of IoT, old paradigms are used which, from a security perspective, offer little to no value. Often closed systems arise, and the usage and sharing of data becomes difficult. Additional project and integration costs are a direct result of delays in connectivity. Data quality, data transparency, and data sovereignty of users, companies, and organizations suffer as a result of this.
The Neuropil® CyberSecurity Mesh ensures data quality, data transparency, and data sovereignty all the while reducing IT costs, maximizing availability, and increasing reliability. The open source solution establishes secure communication path between users, applications and devices. This happens in dynamic, decentralized and fully automated way.
Learn more about core concepts, projects and protocol details
The Neuropil® CyberSecurity Mesh provides the following features out of the box: