|
2 | 2 | title: "Security & Privacy" |
3 | 3 | --- |
4 | 4 |
|
5 | | -Placeholder: Security considerations, threat model, and privacy guidance. |
| 5 | +iroh is designed with security and privacy as core principles. This document |
| 6 | +outlines the key security and privacy features of iroh, as well as best |
| 7 | +practices for deploying and using iroh in a secure manner. |
| 8 | + |
| 9 | +## End-to-End Encryption |
| 10 | + |
| 11 | +All data transmitted between iroh endpoints is protected with end-to-end |
| 12 | +encryption. This means that data is encrypted on the sender's device and can only |
| 13 | +be decrypted by the intended recipient. Even relay servers that facilitate |
| 14 | +connections between endpoints cannot read the data being transmitted. |
| 15 | + |
| 16 | +End-to-end encryption is achieved using modern cryptographic algorithms and protocols, |
| 17 | +ensuring that data remains confidential and secure during transit. By defaul;t, |
| 18 | +iroh uses Ed25519 keys for endpoint identities and encryption. If you require |
| 19 | +different cryptographic algorithms, you can configure iroh to use them during |
| 20 | +endpoint creation. |
| 21 | + |
| 22 | +[Contact us for assistance](https://n0.computer/) with custom cryptographic configurations. |
| 23 | + |
| 24 | +## Public Relays |
| 25 | + |
| 26 | +All traffic sent through the public relays is end-to-end encrypted. The relays |
| 27 | +are not able to read any of the traffic that they forward or help connect. |
| 28 | +However, the relays are able to see metadata about connections, such as source |
| 29 | +and destination IP addresses, connection times, and the amount of data |
| 30 | +transferred. |
| 31 | + |
| 32 | +We recommend that you do not use the public relays for sensitive or confidential |
| 33 | +data. If you need more control over your relay infrastructure, we recommend that |
| 34 | +you upgrade to a managed relay or self-host your own relay. |
| 35 | + |
| 36 | +We monitor the public relays for abuse and malicious activity. If we detect |
| 37 | +abuse, we reserve the right to block offending IP addresses or users from |
| 38 | +accessing the public relays. |
| 39 | + |
| 40 | +To learn more about deploying and managing your own relays, see the |
| 41 | +[n0des](//managing-relays) documentation. |
| 42 | + |
0 commit comments