When you build a zero-trust mesh network, security isn't something you bolt on after - it's the foundation. Every architectural decision we make starts with "how does this protect our users?"
Built on WireGuard with ChaCha20-Poly1305 encryption. Keys rotate every 2 minutes. Even relay servers can't read your traffic.
Private keys never leave your devices. The control plane distributes node info and ACLs but never has WireGuard keys.
Direct device-to-device connections with automatic relay fallback. Existing tunnels stay up even if the coordination server goes down.
Devices authenticate via a secure authorization flow or pre-shared node auth keys for headless environments. Auth requests are encrypted end-to-end.
Control traffic between nodes using tag-based rules, not IP addresses. Directional rules with source and destination matching.
We are actively pursuing ISO 27001 certification to formalize our information security management practices.
All mesh traffic is encrypted end-to-end with WireGuard. Your private keys are generated on your devices and never leave them. The control plane knows which devices are connected and distributes node information and ACLs, but it never has your WireGuard keys.
Traffic flows directly between peers. Even when a relay server is involved, it forwards encrypted WireGuard packets between nodes - it cannot read, modify, or inject data.
Your mesh network remains functional even if our coordination server has an outage. Once your devices exchange keys, they connect independently. No central chokepoint, no single point of failure.
Comprehensive controls across infrastructure, data, application, and operations - continuously tested and audited.
We are actively building our compliance program and publish our security posture transparently. Our ISO 27001 certification process is underway - formalizing the controls and practices we already follow.
Our security program is built on established frameworks, adapted to the specific threat model of mesh networking infrastructure.
We publish security bulletins to transparently disclose security issues in our products. View our full disclosure history including affected versions and remediation steps.
No. All mesh traffic is end-to-end encrypted with WireGuard. Your private keys never leave your devices. The control plane distributes node info and ACLs but never has WireGuard keys. Even relay servers only forward encrypted packets - they cannot read, modify, or inject data.
Existing peer-to-peer tunnels stay up. The coordination server is needed for signaling and establishing new connections, but once two devices have a tunnel, they communicate independently. If the connection drops, clients reconnect and receive a fresh sync automatically.
We acknowledge reports within 24 hours and provide an initial assessment within 72 hours. We follow responsible disclosure practices and publish security bulletins for all confirmed issues. Reporters receive credit if desired.
We are currently pursuing ISO 27001 certification. Our security program is built on established frameworks including NIST CSF and CIS Controls. Contact security@baseguard.net for details on our security posture.
We do not currently operate a formal bug bounty program, but we welcome responsible disclosure and will work with researchers under our safe harbor policy. Report vulnerabilities to security@baseguard.net.
We take every report seriously. When you discover a vulnerability, reach out to security@baseguard.net with a detailed description, reproduction steps, and impact assessment.
We operate under a safe harbor policy - we will not pursue legal action against researchers who act in good faith, respect user privacy, and give us reasonable time to respond.
< 24h acknowledgement
< 72h initial assessment
Credit for reporters who want it