You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+11-13Lines changed: 11 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,29 +18,27 @@ Ockam empowers you to build secure-by-design apps that can trust data-in-motion.
18
18
19
19
With Ockam:
20
20
21
-
**Impossible connections become possible.** Establish secure channels between systems in private networks that previously could not be connected because it is either too difficult or insecure
22
-
23
-
**All public endpoints become private.** Connect your applications and databases without exposing anything publicly
21
+
***Impossible connections become possible.** Establish secure channels between systems in private networks that previously could not be connected because it is either too difficult or insecure.
22
+
***All public endpoints become private.** Connect your applications and databases without exposing anything publicly.
24
23
25
24
\
26
25
At its core, Ockam is a toolkit for developers to build applications that can create end-to-end encrypted, mutually authenticated, secure communication channels:
27
26
28
-
**From anywhere to anywhere:** Ockam works across any network, cloud, or on prem infrastructure
29
-
30
-
**Over any transport topology:** Ockam is compatible with every transport layer including TCP, UDP, Kafka, Bluetooth
31
-
32
-
**Without no infrastructure, network, or application changes:** Ockam works at the application layer, so you don’t need to make complex changes
27
+
***From anywhere to anywhere:** Ockam works across any network, cloud, or on prem infrastructure. 
28
+
***Over any transport topology:** Ockam is compatible with every transport layer including TCP, UDP, Kafka, or even Bluetooth.
29
+
***Without no infrastructure, network, or application changes:** Ockam works at the application layer, so you don’t need to make complex changes. 
30
+
***While ensuring the risky things are impossible to get wrong:** Ockam’s protocols do the heavy lifting to establish end-to-end encrypted, mutually authenticated secure channels
33
31
34
-
**While ensuring the risky things are impossible to get wrong:** Ockam’s protocols do the heavy lifting to establish end-to-end encrypted, mutually authenticated secure channels
35
-
36
-
### Why Ockam is a game changer
32
+
### Why Ockam is so unique
37
33
38
34
Traditionally, connections made over TCP are secured with TLS. However, the security guarantees of a TLS secure channel only apply for the length of the underlying TCP connection. It is not possible to connect two systems in different private networks over a single TCP connection. Thus, connecting these two systems requires exposing one of them over the Internet, and breaking the security guarantees of TLS.
39
35
40
-
Ockam works differently. Our secure channel protocol sits on top of an application layer routing protocol. This routing protocol can hand over messages from one transport layer connection to another. This can be done over any transport protocol, with any number of transport layer hops: TCP to TCP to TCP, TCP to UDP to TCP, UDP to Bluetooth to Kafka, etc. 
36
+
**Ockam works differently**. Our secure channel protocol sits on top of an application layer routing protocol. This routing protocol can hand over messages from one transport layer connection to another. This can be done over any transport protocol, with any number of transport layer hops: TCP to TCP to TCP, TCP to UDP to TCP, UDP to Bluetooth to TCP to Kafka, etc. 
41
37
42
38
Over these transport layer connections, Ockam sets up an end-to-end encrypted, mutually authenticated connection. This unlocks the ability to create secure channels between systems that live in entirely private networks, without exposing either end to the Internet. 
43
39
40
+
<figure><imgsrc=".gitbook/assets/Screenshot 2025-02-19 at 7.25.34 PM.png"alt=""><figcaption><p>Examples of Ockam Secure Channels over multiple hops of TCP, Kafka, UDP, or anything else.</p></figcaption></figure>
41
+
44
42
Since Ockam’s routing protocol is at the application layer, complex network and infrastructure changes are not required to make these connections. Rather than a months-long infrastructure project, you can connect private systems in minutes while ensuring the risky things are impossible to get wrong. NATs are traversed; Keys are stored in vaults; Credentials are short-lived; Messages are authenticated; Data-integrity is guaranteed; Senders are protected from key compromise impersonation; Encryption keys are ratcheted; Nonces are never reused; Strong forward secrecy is ensured; Sessions recover from network failures; and a lot more.
45
43
46
44
### Ockam is easy to use
@@ -50,7 +48,7 @@ The magic of Ockam is it's simplicity. All you need to do is subscribe to Ockam
0 commit comments