EDJX and Security

Data Encryption

Data is encrypted in transit and all inter-service communications uses mTLS mTLS. 

  • mTLS: Mutual TLS, or mTLS for short, is a method for mutual authentication. mTLS ensures that the parties at each end of a network connection are who they claim to be by verifying that they both have the correct private key. The information within their respective TLS certificates provides additional verification.

WASM

Functions are executed in a WASM sandbox.

  • WebAssembly (abbreviated WASM) is a binary instruction format for a stack-based virtual machine. Wasm is designed as a portable compilation target for programming languages, enabling deployment on the web for client and server applications.

Nodes and Servers

All nodes are physically secured and only access is given to approved EDJX personnel. 

All servers are DDOS protected against protocol, volume-based attacks, or TCP SYN floods, with mitigation in under 10 seconds.

  • DDoS: A DDoS Attack means "Distributed Denial-of-Service (DDoS) Attack" and it is a cybercrime in which the attacker floods a server with internet traffic to prevent users from accessing connected online services and sites.
  • TCP SYN floods: A TCP SYN flood DDoS attack occurs when the attacker floods the system with SYN requests in order to overwhelm the target and make it unable to respond to new real connection requests. It drives all of the target server's communications ports into a half-open state.

Data Centers

We use highly secure data centers to host our servers.