|
20 | 20 |
|
21 | 21 | It allows users including developers, organizations, and machines—to **store these secrets in encrypted vaults on their own devices, and share them directly with trusted parties.** |
22 | 22 |
|
23 | | -* **All data is end-to-end encrypted**, both in transit and at rest, eliminating the risk associated with third-party storage. |
24 | | -* **Polykey provides a command line interface**, desktop and mobile GUI, and a web-based control plane for organizational management. |
25 | | -* By treating secrets as tokenized authority, it offers a fresh approach to **managing and delegating authority in zero-trust architectures** without adding burdensome policy complexity - a pervasive issue in existing zero-trust systems. |
26 | | -* Unlike complex self-hosted secrets management systems that require specialized skills and infrastructure, Polykey is **installed and running directly from the end-user device**. |
27 | | -* It is built to **automatically navigate network complexities** like NAT traversal, connecting securely to other nodes without manual configuration. |
| 23 | +- **All data is end-to-end encrypted**, both in transit and at rest, eliminating the risk associated with third-party storage. |
| 24 | +- **Polykey provides a command line interface**, desktop and mobile GUI, and a web-based control plane for organizational management. |
| 25 | +- By treating secrets as tokenized authority, it offers a fresh approach to **managing and delegating authority in zero-trust architectures** without adding burdensome policy complexity - a pervasive issue in existing zero-trust systems. |
| 26 | +- Unlike complex self-hosted secrets management systems that require specialized skills and infrastructure, Polykey is **installed and running directly from the end-user device**. |
| 27 | +- It is built to **automatically navigate network complexities** like NAT traversal, connecting securely to other nodes without manual configuration. |
28 | 28 |
|
29 | 29 | **Key features:** |
30 | 30 |
|
31 | | -* **Decentralized Encrypted Storage** - No storage of secrets on third parties, secrets are stored on your device and synchronised point-to-point between Polykey nodes. |
32 | | -* **Secure Peer-to-Peer Communication** - Polykey bootstraps TLS keys by federating trusted social identities (e.g. GitHub). |
33 | | -* **Secure Computational Workflows** - Share static secrets (passwords, keys, tokens and certificates) with people, between teams, and across machine infrastructure. Create dynamic (short-lived) smart-tokens with embedded policy for more sophisticated zero-trust authority verification. |
34 | | -* With Polykey Enterprise, you can create private networks of Polykey nodes and apply mandatory policy governing node behaviour. |
| 31 | +- **Decentralized Encrypted Storage** - No storage of secrets on third parties, secrets are stored on your device and synchronised point-to-point between Polykey nodes. |
| 32 | +- **Secure Peer-to-Peer Communication** - Polykey bootstraps TLS keys by federating trusted social identities (e.g. GitHub). |
| 33 | +- **Secure Computational Workflows** - Share static secrets (passwords, keys, tokens and certificates) with people, between teams, and across machine infrastructure. Create dynamic (short-lived) smart-tokens with embedded policy for more sophisticated zero-trust authority verification. |
| 34 | +- With Polykey Enterprise, you can create private networks of Polykey nodes and apply mandatory policy governing node behaviour. |
35 | 35 |
|
36 | 36 | ## Table of Contents |
37 | | -* [Installation](#installation) |
38 | | -* [Development](#development) |
39 | | - * [Docs Generation](#docs-generation) |
40 | | - * [Publishing](#publishing) |
41 | | -* [License](#license) |
| 37 | + |
| 38 | +- [Installation](#installation) |
| 39 | +- [Development](#development) |
| 40 | + - [Docs Generation](#docs-generation) |
| 41 | + - [Publishing](#publishing) |
| 42 | +- [License](#license) |
42 | 43 |
|
43 | 44 | ## Installation |
44 | 45 |
|
|
0 commit comments