Cryptographic Network Intelligence Platform

Three Products.
One Foundation.
Talk to All of It.

eBPF kernel enforcement and hardware-anchored identity are the foundation. Natural language is the interface. Three products serve three different buyers — and feed each other.

"They've been studying you for years. Now you study them."
🛡
TunnelMind Enterprise
Buyer: CISO · DPO · NetSec Lead

AI agent governance with cryptographic proof. Behavioral attestation chains, kernel-level policy enforcement, one-click compliance exports your auditor can verify with openssl.

👁
TunnelMind Personal
Buyer: Developer · Journalist · Privacy User

See who's watching you. Real-time surveillance graph, tracker blocking, corporate ownership chains, exposure scoring, and the Dark Mirror — a dossier of what they know about you.

🌐
TunnelMind Intelligence
Buyer: Carrier · Threat Intel · Researcher

Distributed shadow BGP dataset. Prefix hijack detection, jurisdiction mapping, route path history — cryptographically signed by hardware-anchored nodes across the network.

Every Personal user is a sensor node. Their anonymized data feeds the Intelligence dataset. The dataset makes Enterprise more valuable. The flywheel compounds.

01 — THE FOUNDATIONAll Three Products Share This

The internet was built on trusted declarations: "I am who I say I am." "My traffic goes where I say it goes." Every one of those assumptions is broken. TunnelMind replaces declarations with cryptographic proof — at the layer below the OS, before anything can lie.

eBPF TC Hooks
Kernel-level packet inspection on wg0. Sub-microsecond. Cannot be bypassed by userspace — including a compromised agent.
Hardware-Anchored Identity
Device certs rooted in TPM/iSIM/Secure Enclave. WireGuard pubkey IS the device identity. IEEE 802.1AR LDevID, 24hr TTL.
Behavioral Attestation Chains
Every event: SHA-256 hashed, linked to previous, Merkle tree, Ed25519 signed. Tamper one → all break.
WireGuard Encrypted Transport
All traffic through an authenticated mesh. The tunnel is the trust boundary. MCP server only reachable from inside.
APPLICATION LAYER USERSPACE KERNEL IDENTITY HARDWARE MUTABLE AI Agents LLM, AutoGen, etc. Browsers Human traffic Firewalls / SIEM Can be lied to ✗ TUNNELMIND USERSPACE Attestation Chain Policy Engine MCP + LLM Natural Language Surveillance Intel Ed25519 · Merkle tree · YAML policies · Ollama + Mistral · 11 MCP tools KERNEL ENFORCEMENT — CANNOT BE BYPASSED eBPF TC Hooks on wg0 Per-packet · sub-μs · 7-step pipeline WireGuard Interface Encrypted mesh · wg0 LDevID Certificate X.509 · IEEE 802.1AR · 24hr TTL · 4 Custom OIDs OID.1 TrustTier OID.2 PolicyTags OID.3 HwPlatform OID.4 WGPubKey VAULT PKI ISSUES u8 trust_tier iSIM / EID GSMA SGP.02 TIER 0 TPM 2.0 TCG · StrongBox TIER 1 Secure Enclave Apple SE · TrustZone TIER 2 Software Only ECDSA P-256 · memory TIER 3 Platform-specific evidence verified → single universal certificate issued TRUSTED UNTRUSTED ← ONE CERT ← MANY HW
Fig. 1 — Shared foundation. Diverse hardware converges into one LDevID. eBPF reads one byte. All three products build on this.

02 — THE INTERFACETalk to Your Network in Plain English

The MCP server is the control plane for all three products. Bound exclusively to the WireGuard interface — only reachable from inside the authenticated tunnel. A local LLM (Ollama + Mistral 7B) runs on-node. No data ever leaves for inference. Air-gapped intelligence.

You don't write eBPF rules. You don't edit YAML. You don't query BPF maps. You talk.

Block all agent traffic to Chinese-controlled ASNs
Done. Added BLOCK rule for source_class=AGENT → jurisdiction=CN. Policy hash updated: e4a91c.... eBPF policy_map updated — 847 prefixes enforced. Effective immediately.
Who has been watching me the most this week?
Top surveillance actors (7 days):
1. Google (US · PRISM) — 12,847 connections · $4.20 est. value
2. Meta (US) — 6,203 connections · $2.80
3. Amazon (US) — 3,891 connections · $1.50
4. ByteDance (CN) — 1,204 connections · FLAGGED
5. Oracle BlueKai (US · BROKER) — 892 connections · $3.40

Total estimated annual data value: $247.00
Prove none of my dev agents sent credentials externally in the last 24 hours
Audit complete. 2,341 AGENT events in 24h. 0 with data_category=CREDENTIALS. 14 flagged AUDIT for SOURCE_CODE → GitHub API (authorized). Chain integrity: VERIFIED — all Ed25519 sigs valid. Merkle root: f7b301...

→ EXPORT COMPLIANCE REPORT

11 MCP tools expose every capability across all three products: tunnelmind_status, tunnelmind_block, tunnelmind_allow, tunnelmind_policy_set, tunnelmind_attest, tunnelmind_graph_query, tunnelmind_agent_audit, tunnelmind_node_list, tunnelmind_bgp_query, tunnelmind_identity_verify, tunnelmind_cost_of_me. The LLM decides which tools to call. You just ask.

03 — TUNNELMIND ENTERPRISEAgent Governance with Cryptographic Proof

AI agents are ungoverned endpoints. They make autonomous network requests, can be hijacked via prompt injection mid-session, and leave no auditable trace. A certificate proves who started — it proves nothing about who's driving at mile 3.

TunnelMind Enterprise doesn't certify agents. It attests their behavior.

The Compliance Question

A CISO asks: "Show me every packet my AI agents sent to a Chinese-controlled ASN in the last 30 days, prove cryptographically that none contained PII, and generate a signed report for my auditor."

TunnelMind answers in under 10 seconds with hardware-anchored proof. That capability does not exist anywhere in the market.

Compliance Export

One click → signed ZIP verifiable with openssl and jq. No TunnelMind software required.

FileContents
events.jsonAll events in range (NDJSON, machine-readable)
violations.jsonVIOLATION and CRITICAL events only
verify.shHash integrity, Ed25519 sigs, chain linkage — self-contained
signing_key.pemEd25519 public key for verification

Default Policy Rules

RuleVerdictTrigger
CRED-CRITICALBLOCKCredentials → suspicious destination
AGENT-GOV-BLOCKBLOCKAgent → government-attributed infra
EU-PII-BLOCKBLOCKPII to data broker — GDPR Art. 5
CN-PII-BLOCKBLOCKPII/financial → China jurisdiction
AGENT-SOURCECODE-AUDITAUDITAgent source code → external
SURVEILLANCE-WARNWARNTraffic to surveillance actor
DEFAULT-ALLOWALLOWNo rule matched

04 — TUNNELMIND PERSONALSee Who's Watching You

Every tracker, data broker, and fingerprinting script is identified, attributed to its corporate parent, mapped to its jurisdiction, and assigned a dollar value. You see everything. Then you block what you want — in plain English.

YOU 10.10.0.2 Google US · PRISM Meta Amazon ByteDance CN Acxiom BROKER NSA GOV US EU CN BROKER GOV
Fig. 2 — Real-time surveillance graph. Three.js/WebGL. Every entity watching your traffic, mapped by jurisdiction and data volume.

The Dark Mirror Report

Your complete surveillance dossier — exactly as an advertiser sees you. Estimated age, income bracket, health indicators, political leanings, purchase intent. Generated from your telemetry and LLM inference. Shareable. The viral hook: "I sent my data to 847 companies last month."

Pipeline
DNS capture → corporate attribution → beacon fingerprinting → exposure scoring → enforcement
Enforcement
DNS sinkhole, eBPF drop, or say "block Google" in natural language

05 — TUNNELMIND INTELLIGENCEThe Shadow BGP Dataset

Every node — Enterprise or Personal — passively observes BGP routing from its vantage point. Observations are signed by hardware identity and aggregated into a dataset that answers questions no commercial dataset can. The dataset compounds with every deployed node. It cannot be replicated without the sensor network. This is the long-term moat.

Prefix Hijack Detection
Observed origin AS ≠ RPKI-authorized → signed real-time alert
Jurisdiction Mapping
IP → prefix → origin AS → ownership → legal jurisdiction
Route Path History
Full AS path per prefix. Temporal routing analysis.
Anomaly Feed
Live BGP anomalies. RPKI validation via RTR (RFC 8210).

06 — THE VISIONInfrastructure for a Fragmenting Internet

The internet is splitting. China's Great Firewall, Russia's RuNet, the EU's data sovereignty mandates, emerging regulations in India and Brazil — the assumption of a single global internet is already dead. What remains is a set of incompatible regulatory zones with conflicting rules about where data can go, who can see it, and what happens when those rules are violated.

Every multinational is going to need jurisdiction-aware routing. Not as a feature. As infrastructure. Traffic to an EU customer can't touch a US server that falls under FISA 702. Traffic from a Chinese subsidiary can't transit an ASN controlled by a sanctioned entity. A packet's path through the internet is now a compliance question — and today, nobody can answer it with proof.

The problem is getting worse, not better. BGP doesn't know about jurisdictions. IP addresses don't carry citizenship. Routers don't read regulations. The gap between what the law demands and what the network can prove is widening every year. The fines are measured in tens of millions. The reputational damage is immeasurable.

TunnelMind is building the infrastructure to navigate this. All three products converge on this problem:

Shadow BGP Dataset
The map. Every prefix mapped to origin AS, ownership chain, and legal jurisdiction. Real-time observation of how the internet is actually routing — not how it claims to route.
eBPF XDP Enforcement
The enforcement. Per-packet routing decisions based on destination ASN and jurisdiction. Drop, reroute, or tunnel — decided in the kernel before userspace sees it.
Jurisdiction Policy Graph
The brain. A local LLM maintains a live graph of which data categories can flow to which jurisdictions under which regulatory frameworks. Updated continuously.
Post-Quantum Readiness
CRYSTALS-Kyber (ML-KEM-768) key exchange layered on WireGuard. Every peer negotiates PQ-safe keys today — before the NIST mandate deadline arrives.
Where This Goes

A multinational's DPO asks: "Prove that no EU citizen PII transited a non-adequate jurisdiction in the last quarter. Sign the proof cryptographically. Generate a report my regulator will accept."

The Shadow BGP dataset maps every prefix to a jurisdiction. The eBPF enforcement layer ensures packets obey the jurisdiction graph. The attestation chain proves it happened. The compliance export packages the proof. The LLM translates the question into the query.

That's not three products. That's one answer assembled from three products that each do their job.

The moat compounds on two axes: The Shadow BGP dataset gets more accurate with every deployed node. The jurisdiction policy graph gets smarter with every regulatory change the LLM ingests. Both improve automatically over time. A competitor starting today would need years of deployed sensors and accumulated routing intelligence to match what TunnelMind's network has already observed.

07What We Deliberately Don't Build

ExclusionRationale
Agent identity certificatesCan't prove what happens after prompt injection. Behavior attestation scales. Identity doesn't.
Profile poisoningContradicts observation-only thesis. Degrades telemetry. Legal exposure.
BGP route injectionRead-only observer. Never modifies routes. Trust and legal boundary.
Cloud LLM inferenceLocal only (Ollama + Mistral). No data leaves the node. Air-gapped.

08Standards & Compliance

StandardApplication
IEEE 802.1AR-2018LDevID certificate structure. 24hr TTL. Hardware-anchored identity.
TCG TPM 2.0 §18.4TPM2_Quote for PCR attestation.
GSMA SGP.02eUICC/iSIM EID — Tier 0 on-die identity.
NIST SP 800-207Zero Trust Architecture enforcement.
RFC 4271 / 8210BGP-4 observation. RPKI validation via RTR.
NIST FIPS 186-5Ed25519 signatures on attestation events.
NIST PQC ML-KEMPost-quantum key exchange readiness.
GDPR Art. 5, 9, Ch. VCross-border data enforcement.