INTL-NRO
Inner Trusted Labyrinth – Non-Routable Object (InTL-NRO) within SDN, PQC-KEM (ML-KEM, FIPS 203)
EEN Network introduces InTL-NRO: SDN, PQC-KEM, an advanced array of isolated, non-routable object servers integrated within the EEN encrypted, obfuscated, and randomized network. These servers, ranging from blockchain servers to database servers, are fortified with Post-Quantum Decryption Resistant (PQC) ML-KEM encryption. The servers operate within the internal EEN encrypted mesh network, enhancing security without performing Command and Control or Transit node functionality.
Inbound Traffic Restriction
Object servers allow no inbound traffic and remain invisible and inaccessible from the outside digital world, ensuring a secure environment.
Outbound Traffic Control
Permit outbound traffic to the digital world only from within the EEN environment, presenting as integers within the obfuscated, randomized EEN network.
Private
Communication
Object servers communicate with EEN servers via a proprietary private IP scheme, ensuring secure and isolated interactions.
Managed Attribution Mechanism
Procured, managed, and maintained via a managed attribution mechanism, EEN servers and non-routable object servers are configured with the highest security techniques in the Cyber industry.
Difference between EEN Node and Non-Routable Object Node
EEN Node
Function: Forwards encrypted traffic within the EEN network.
Role:
Acts as an intermediary between:
- Command-and-Control (C2) node ➡ Exit EEN node
Purpose:
- Enables double-hop randomized connections.
- Enhances overall traffic security and anonymity.
Non-Routable Object Node
Function: Does not forward traffic.
Role:
- Performs a dedicated service/function for a specific server type.
Access:
- Can only be identified and accessed within the EEN SDN environment.
- Completely isolated from the external digital world.
User Experience
InTL-NRO: SDN, PQC-KEM delivers a seamless user experience within the EEN environment. Users benefit from enhanced security, controlled traffic flow, and isolation from external threats, ensuring a robust and reliable computing environment.

Applications
Blockchain Services
Facilitates secure and isolated
blockchain operations within the EEN environment.
Web Services
Provides secure web services with controlled outbound traffic.
VOIP Services
Ensures secure VOIP services with restricted inbound access.
Citrix Services
Delivers secure Citrix services within the EEN network.
Database Services
Enables secure and isolated database services for enhanced data protection.