Quick Connect
Start a governed tunnel session. Every byte, every DNS query, every connection event is recorded in a cryptographic hash chain and anchored in a public transparency log. This isn't another VPN — it's provable accountability for the tunnel operator.
Active Sessions
Session History
Code Deployments
Every worker deployment is recorded in the transparency log with a CODE_DEPLOYMENT leaf.
Per-Session DNS Chain Audit
Each governed session records DNS queries in a separate hash chain. Auditors can independently verify that no DNS queries were leaked, injected, or redirected outside the tunnel.
Live DoH Test
Test encrypted DNS resolution through the governance-attested DNS proxy. Queries are hashed and chained for auditability.
Billing & Settlement
Metered governance billing. Usage is measured by governed sessions, attested bytes, and audited DNS queries — charged to the tunnel operator, not the end user.
System Status
Infrastructure status for the governance protocol. These workers provide session attestation, chain integrity, DNS auditing, and transparency log anchoring.
Log STH
Tamper Detection Demo
Proof that hash chain integrity catches data manipulation
This is what the user gets. A governed tunnel session produces a cryptographic hash chain — every link is sha256(prev_hash + canonical(event)). If the operator alters any record — bytes transferred, DNS queries, session metadata — the chain breaks and the exact point of tampering is provably identified. No trust required.
Activity Log
Deployment Readiness
Pre-flight checklist for governance protocol production readiness.