This page is currently in development.
Confirm Open-Source Code is Secure
Limit Egress Network Traffic for Specific Websites
Protect Nodes Against Cyber Threats
Each node is protected with automated firewall rules to block cyber attacks and exploits without impacting node performance.
Unused ports are closed and multi-layer firewalls protect against brute-forcing, denial-of-service, ping-of-death and spoofing attacks.
Synchronize Nodes Using Zero-Trust Security Methods
Extensive validation is processed when nodes send monitoring data to make sure a compromised node can't attack other nodes with poisoned data.