Secure by design
Edge is secure by design, utilizing state of the art cryptography and decentralized techniques to ensure the security of your applications and files.
Security in distributed devices
Edge nodes are contributed to the network by individuals and businesses around the world. Nodes are untrusted in the network by design. Their connectivity to the network is controlled through account-linked, and use-once keys. This ACL is tied in to a consensus mechanism that periodically and randomly checks the veracity of expected responses from nodes.
Host devices are abstracted from the frontline of the network, and are not directly addressable or exposed to the consumers of services.
In addition to this, no single file is stored on a single device in the network. Files are encrypted and broken into hundreds of parts, which are then seeded across devices in the network. This means that even if you knew what you were looking for in the network, you would have to break into hundreds of homes and offices, then break in to hundreds of individual devices.
Application and file security
Individual files are encrypted and split into hundreds of pieces, which are then distributed across nodes in the network. Secured virtual machines and custom hypervisors are used in tandem with secure enclaves such as Intel SGX and key attestation servers to ensure application-level security.
Edge has built in mitigation against Distributed Denial of Service Attacks to maintain the performance and availability of your apps. This is handled both through the decentralized nature of the network itself, utilizing BGP routing to offset incoming load, and through network scrubbing services, provided by the data centers contributing capacity to the network.Find out more
DNS over HTTPS (DoH) is employed to increase security. Check sums between node types from the point of request to the point of delivery are employed to remove the potential for eavesdropping and manipulation (such as man in the middle attacks).
Edge is a fully decentralized network, built through contributions of computing power from all over the world.About global reach
The world’s first edge network, built using the spare computing capacity all around us.About Edge architecture
Telemetry built in at every level, bringing accountability and auditability to every transaction in the network.About Edge monitoring
Built in mitigation against Distributed Denial of Service Attacks to maintain the performance and availability of your apps.About DDoS protection