Fully Decentralized
End to End Encryption
Full Randomization
Post Quantum Cryptography
(NIST-NSA Compliant)
Network Redundant
Layer 2 & Layer 3 Software
Defined Network
Hardware & Software agnostic
Multiple Encryption Protocols