INTL-NRO

Inner Trusted Labyrinth – Non-Routable Object (InTL-NRO) within SDN, PQC-KEM (ML-KEM, FIPS 203)  

EEN Network introduces InTL-NRO: SDN, PQC-KEM, an advanced array of isolated, non-routable object servers integrated within the EEN encrypted, obfuscated, and randomized network. These servers, ranging from blockchain servers to database servers, are fortified with Post-Quantum Decryption Resistant (PQC) ML-KEM encryption. The servers operate within the internal EEN encrypted mesh network, enhancing security without performing Command and Control or Transit node functionality.


Inbound Traffic Restriction

Object servers allow no inbound traffic and remain invisible and inaccessible from the outside digital world, ensuring a secure environment.


Outbound Traffic Control 

Permit outbound traffic to the digital world only from within the EEN environment, presenting as integers within the obfuscated, randomized EEN network.


Private 

Communication

Object servers communicate with EEN servers via a proprietary private IP scheme, ensuring secure and isolated interactions.


Managed Attribution Mechanism

Procured, managed, and maintained via a managed attribution mechanism, EEN servers and non-routable object servers are configured with the highest security techniques in the Cyber industry.


Difference between EEN Node and Non-Routable Object Node

EEN Node

Function: Forwards encrypted traffic within the EEN network.

Role

Acts as an intermediary between: 

  • Command-and-Control (C2) node ➡ Exit EEN node

Purpose

  • Enables double-hop randomized connections.
  • Enhances overall traffic security and anonymity.

Non-Routable Object Node

Function: Does not forward traffic.

Role

  • Performs a dedicated service/function for a specific server type.

Access

  • Can only be identified and accessed within the EEN SDN environment.
  • Completely isolated from the external digital world.


User Experience


InTL-NRO: SDN, PQC-KEM delivers a seamless user experience within the EEN environment. Users benefit from enhanced security, controlled traffic flow, and isolation from external threats, ensuring a robust and reliable computing environment.


person using phone and laptop

Applications

Blockchain Services

Facilitates secure and isolated

blockchain operations within the EEN environment.


Web Services

Provides secure web services with controlled outbound traffic.


VOIP Services

Ensures secure VOIP services with restricted inbound access.


Citrix Services

Delivers secure Citrix services within the EEN network.


Database Services

Enables secure and isolated database services for enhanced data protection.

Take control of your data security today. Speak to an expert.