|
16 | 16 |
|
17 | 17 | ## What is Polykey? |
18 | 18 |
|
19 | | -**Polykey is an open-source, peer-to-peer system** that addresses the critical challenge in cybersecurity: **the secure sharing and delegation of authority**, in the form of secrets like keys, tokens, certificates, and passwords. |
20 | | - |
21 | | -It allows users including developers, organizations, and machines—to **store these secrets in encrypted vaults on their own devices, and share them directly with trusted parties.** |
22 | | - |
23 | | -- **All data is end-to-end encrypted**, both in transit and at rest, eliminating the risk associated with third-party storage. |
24 | | -- **Polykey provides a command line interface**, desktop and mobile GUI, and a web-based control plane for organizational management. |
25 | | -- By treating secrets as tokenized authority, it offers a fresh approach to **managing and delegating authority in zero-trust architectures** without adding burdensome policy complexity - a pervasive issue in existing zero-trust systems. |
26 | | -- Unlike complex self-hosted secrets management systems that require specialized skills and infrastructure, Polykey is **installed and running directly from the end-user device**. |
27 | | -- It is built to **automatically navigate network complexities** like NAT traversal, connecting securely to other nodes without manual configuration. |
| 19 | +**Polykey is an open-source, peer-to-peer system** that addresses the critical |
| 20 | +challenge in cybersecurity: **the secure sharing and delegation of authority**, |
| 21 | +in the form of secrets like keys, tokens, certificates, and passwords. |
| 22 | + |
| 23 | +It allows users including developers, organizations, and machines—to **store |
| 24 | +these secrets in encrypted vaults on their own devices, and share them directly |
| 25 | +with trusted parties.** |
| 26 | + |
| 27 | +- **All data is end-to-end encrypted**, both in transit and at rest, eliminating |
| 28 | + the risk associated with third-party storage. |
| 29 | +- **Polykey provides a command line interface**, desktop and mobile GUI, and a |
| 30 | + web-based control plane for organizational management. |
| 31 | +- By treating secrets as tokenized authority, it offers a fresh approach to |
| 32 | + **managing and delegating authority in zero-trust architectures** without |
| 33 | + adding burdensome policy complexity - a pervasive issue in existing zero-trust |
| 34 | + systems. |
| 35 | +- Unlike complex self-hosted secrets management systems that require specialized |
| 36 | + skills and infrastructure, Polykey is **installed and running directly from |
| 37 | + the end-user device**. |
| 38 | +- It is built to **automatically navigate network complexities** like NAT |
| 39 | + traversal, connecting securely to other nodes without manual configuration. |
28 | 40 |
|
29 | 41 | **Key features:** |
30 | 42 |
|
31 | | -- **Decentralized Encrypted Storage** - No storage of secrets on third parties, secrets are stored on your device and synchronised point-to-point between Polykey nodes. |
32 | | -- **Secure Peer-to-Peer Communication** - Polykey bootstraps TLS keys by federating trusted social identities (e.g. GitHub). |
33 | | -- **Secure Computational Workflows** - Share static secrets (passwords, keys, tokens and certificates) with people, between teams, and across machine infrastructure. Create dynamic (short-lived) smart-tokens with embedded policy for more sophisticated zero-trust authority verification. |
34 | | -- With Polykey Enterprise, you can create private networks of Polykey nodes and apply mandatory policy governing node behaviour. |
| 43 | +- **Decentralized Encrypted Storage** - No storage of secrets on third parties, |
| 44 | + secrets are stored on your device and synchronised point-to-point between |
| 45 | + Polykey nodes. |
| 46 | +- **Secure Peer-to-Peer Communication** - Polykey bootstraps TLS keys by |
| 47 | + federating trusted social identities (e.g. GitHub). |
| 48 | +- **Secure Computational Workflows** - Share static secrets (passwords, keys, |
| 49 | + tokens and certificates) with people, between teams, and across machine |
| 50 | + infrastructure. Create dynamic (short-lived) smart-tokens with embedded policy |
| 51 | + for more sophisticated zero-trust authority verification. |
| 52 | +- With Polykey Enterprise, you can create private networks of Polykey nodes and |
| 53 | + apply mandatory policy governing node behaviour. |
35 | 54 |
|
36 | 55 | ## Table of Contents |
37 | 56 |
|
@@ -89,4 +108,5 @@ git push --tags |
89 | 108 |
|
90 | 109 | ## License |
91 | 110 |
|
92 | | -Polykey is licensed under the GPLv3, you may read the terms of the license [here](LICENSE). |
| 111 | +Polykey is licensed under the GPLv3, you may read the terms of the license |
| 112 | +[here](LICENSE). |
0 commit comments