Post-Quantum Zero Trust, Built Into the Network Layer

Zero Trust Enforced On Every Packet, Not Just Connections

VeilNet replaces IP-based routing with cryptographic identity. Every packet is authenticated with post-quantum signatures before it reaches your application -- no VPN, no proxy, no hardware replacement. Deploys as software on your existing infrastructure in minutes.

Secure with Extreme Performance

VeilNet uses multi-agent reinforcement learning to optimise routing dynamically. Performance scales with the network rather than degrading as complexity increases.
1ms Overhead
High-performance Golang concurrent crypto, routing operations with in-memory loadbalancing.
Unlimited Bandwidth
Aggregated WebRTC data channels as one data link, as fast as your network allows.
Idenpendent Tunnels
Each destination has its own "Tether" tunnel, independent of others. No competition, no queueing overhead, no waiting for slow sinks.
Connect anything, from anywhere

No open ports. No relay. No exposure on Internet.

VeilNet routes by cryptographic identity, not IP address. Cloud VMs, containers, bare-metal servers, edge devices, and AI agents connect into one private fabric the moment Conflux starts -- no firewall rules, no inbound ports, no shared relay infrastructure. Tailscale trusts everything inside the tunnel. ngrok and Cloudflare route your traffic through their infrastructure. VeilNet has no trusted interior and no shared relay -- your data never leaves your control.

Cloud, on-prem, containers, edge, OT, IT -- one fabric

VeilNet identity fabric connecting cloud, edge, containers, and on-prem workloads
Zero-day proof

A vulnerability is unreachable if the packet never arrives.

Every packet must carry a valid ML-DSA signature before it reaches your application. No valid identity -- no delivery, regardless of what the packet carries. There are no IPs to scan, no ports to probe, and no topology to enumerate. Traditional firewalls block known signatures and pass everything else through. VPNs trust all traffic inside the tunnel. VeilNet makes unauthenticated traffic invisible at the network layer -- before it reaches any application.

Per-packet ML-DSA authentication stop zero-day attacks before they happen

Attack packet dropped at VeilNet network layer before reaching the application
Post-quantum today, not 2030

Compliant before every deadline -- software only, nothing replaced.

ASD mandates quantum-safe critical systems by 2028. NSA CNSA 2.0 requires quantum-resistant infrastructure by 2026. Tailscale and WireGuard use Curve25519 -- not post-quantum. VeilNet deploys as software on your existing infrastructure, implementing ML-KEM-1024 and ML-DSA-65 at NIST FIPS 203 and 204. No firmware changes, no hardware replacement, no downtime. Quantum-safe from day one.

ML-KEM and ML-DSA, align with NIST FIPS 203 and 204

Post-quantum software overlay deployed alongside existing infrastructure

How it works

  • Authenticate With Your Existing Identity Provider
    Agents and services authenticate via your OAuth2 provider -- Google, Okta, Entra ID, or any OIDC-compatible IdP. No new credentials, no API keys to rotate.
  • Connect Across Any Network Automatically
    Conflux nodes establish direct post-quantum encrypted connections automatically, even behind NAT, firewalls, and across cloud providers. No VPN configuration, no firewall rules.
  • Enforce Access at the Network Layer
    Define policies like "Agent A can reach Database B." Everything else is unreachable by default at the network layer -- not blocked by a rule, simply not routable.
  • Self-Healing Routing
    When routes fail or nodes go offline, the network reconverges automatically using multi-agent reinforcement learning. No manual intervention, no BGP reconfiguration.
  • Multi-Path Redundancy
    Conflux aggregates multiple WebRTC data channels per path. Direct connections when latency allows, automatic multi-hop routing when needed -- without falling back to a single proxy.
  • Quantum-Safe From Day One
    VeilNet uses ML-KEM-1024 and ML-DSA-65 (NIST FIPS 203 and 204). Your infrastructure is compliant with post-quantum mandates without a future migration.
  • Full Observability With OpenTelemetry
    Every control-plane action is traced and streamed to your existing OpenTelemetry-compatible observability stack -- no new monitoring tools, no additional agents.
  • Fully Self-Hosted, No Cloud Dependency
    Every VeilNet component runs on your own infrastructure. No shared control plane, no vendor-managed nodes, no data leaving your environment.
  • One Function Call to Integrate
    Developers integrate VeilNet with a single SDK call. No waiting for firewall change requests or infrastructure provisioning.

Join the waitlist

Be among the first to experience VeilNet enterprise features

Frequently Asked Questions

Direct answers to the questions we hear most from security, infrastructure, and operations teams.