Security

How LayerV secures itself

We're in the trust chain, and we're built from the ground up for it. Minimal surface, hardened protocols, and no visibility into who or what we protect.

Architecture

Security by design

Minimal Public Surface

Only the coordination layer is publicly reachable — purpose-built to be exposed, hardened for that job, tiny attack surface.

UDP-Based Protocol

NHP knock mechanism uses UDP. No handshake to exploit, no SYN floods, no TCP stack vulnerabilities. Invalid packets silently dropped.

Noise Protocol

Same cryptographic foundation as Signal and WireGuard. Mutual authentication before any data exchange.

No Customer Visibility

No public directory of LayerV customers. Attackers can't identify which companies use NHP or which resources are protected.

Ephemeral QURLs

Randomly generated, short-lived, device-locked, single-use. Can't be guessed, enumerated, or replayed.

We Eat Our Own Cooking

Internal infrastructure is NHP-protected. Management plane, control systems — none visible to the public internet.

Trust Model

How we handle trust

We don't hold your identity keys

LayerV doesn't store customer passwords or authenticate users directly. That's your IdP (Okta, Azure AD, etc.). Even if compromised, we couldn't mint valid QURLs without passing through your identity system.

Multi-region AWS infrastructure

Distributed across multiple AWS regions for resilience. No single point of failure for the coordination layer.

Cryptographic identity binding

Every QURL is cryptographically bound to a specific user, device, and session. Interception is useless — the QURL is either expired, device-locked, or already consumed.

Full audit trail

Every access attempt is logged with cryptographic identity binding. Complete visibility for compliance — SOC 2, HIPAA, CISA.

Compliance

Standards & certifications

SOC 2

Type II compliance

HIPAA

Healthcare ready

CISA

Federal standards

OpenNHP

CSA standard

Questions?

Talk to our security team

We're happy to go deep on architecture, protocols, and compliance.