Cryptographic Network Intelligence Platform

Enforcement Below the Lie

eBPF kernel enforcement, hardware-anchored identity, and behavioral attestation chains for AI agent governance and surveillance visibility.

TunnelMind AI, LLC  ·  tunnelmind.ai  ·  March 2026
"They've been studying you for years. Now you study them."

01The Internet Was Built on Trusted Declarations

Every protocol in the modern stack assumes honesty. Devices declare their identity with a MAC address. BGP routers declare where traffic goes. Applications declare what they do with data. Firewalls, SIEMs, and access logs record what software reports — not what actually happened.

Every one of those assumptions is broken. MAC addresses are spoofed in milliseconds. BGP prefix hijacks reroute traffic through adversarial infrastructure. Applications exfiltrate data while reporting compliance. And now, AI agents — autonomous software that makes network requests on behalf of humans — operate with zero governance at the network layer.

The agent governance gap: An authenticated agent can be hijacked via prompt injection at any point in its lifecycle. A certificate proves who started an agent. It proves nothing about who is driving at mile 3. Sub-agents spawn sub-agents spawn sub-agents. Key management doesn't scale to agent velocity.

The current security model — firewalls, application-layer logging, identity certificates — operates where data can be manipulated before it's recorded. TunnelMind operates beneath all of it.

02Architecture: Three Enforcement Primitives

TunnelMind replaces trusted declarations with three cryptographic enforcement primitives, each operating at a layer that cannot be lied to by the layers above it.

APPLICATION LAYER USERSPACE KERNEL HARDWARE AI Agents LLM, AutoGen, etc. Browsers Human traffic Firewalls / SIEM Can be lied to ✗ MUTABLE TUNNELMIND USERSPACE Attestation Chain Policy Engine MCP Server Ed25519 signatures · Merkle audit tree · YAML policies · NL control KERNEL ENFORCEMENT — CANNOT BE BYPASSED eBPF TC Hooks on wg0 Per-packet · sub-μs · 7-step pipeline WireGuard Interface Encrypted mesh · wg0 HARDWARE IDENTITY ANCHOR iSIM / EID · TPM 2.0 · Secure Enclave · IEEE 802.1AR LDevID certificates ↑ TRUSTED ↑ UNTRUSTED
Fig. 1 — TunnelMind enforcement stack. Layers below the dashed line cannot be manipulated by userspace software.

Primitive 1: eBPF TC Hooks

Extended Berkeley Packet Filter programs attached to the Traffic Control subsystem on the WireGuard interface (wg0). Every packet is inspected at the kernel level before the operating system can report on it. Sub-microsecond decision latency. Cannot be bypassed by any userspace process, including a compromised agent.

Primitive 2: Hardware-Anchored Identity

Device certificates issued by a Vault PKI, rooted in hardware — TPM 2.0, iSIM/EID (GSMA SGP.02), or Apple Secure Enclave. The WireGuard public key is the device identity. The certificate proves the device, not just the key. MAC addresses, UDIDs, and software tokens are replaced entirely. Certificate structure follows IEEE 802.1AR (LDevID, 24-hour TTL, automatic rotation).

Primitive 3: Behavioral Attestation Chains

Every network event captured by the eBPF hook becomes a cryptographically signed, hash-linked record. SHA-256 event hashes are chained (each event references the previous hash), structured into a binary Merkle tree, and signed with Ed25519. Change any event and all subsequent hashes break. Tamper detection is mathematical, not policy-based.

03The eBPF Enforcement Pipeline

The kernel enforcement program processes every packet through a 7-step pipeline in a single pass. No packet reaches userspace without being inspected, classified, and recorded.

STEP 1 Parse IPv4/v6 → in6 STEP 2 Revocation O(1) hash drop STEP 3 Identity Peer lookup STEP 4 Cert Expiry ktime < expiry STEP 5 Policy LPM_TRIE STEP 6 Trust Tier Tier ≥ min? STEP 7: EMIT Ring buffer → userspace BPF MAPS peer_identity_map BPF_HASH · 44B/entry revocation_map BPF_HASH · O(1) deny policy_map LPM_TRIE · prefix→tier events RINGBUF · 1MB struct tmd_peer_identity { u8 trust_tier; u64 cert_expiry_ns; u8 wg_pubkey[32]; } __packed; cert_expiry_ns = boot-relative via /proc/uptime conversion at provision time
Fig. 2 — Per-packet eBPF enforcement pipeline. TC ingress on wg0. Every step is a potential DROP.
Decision Latency
Sub-microsecond (kernel fast path)
Bypass Surface
Zero. Kernel TC hook — no userspace override.
Revocation Speed
O(1) hash lookup. Instant drop.
Ring Buffer
1MB non-blocking emission to userspace

04Hardware Identity & Trust Tier Hierarchy

TunnelMind replaces MAC-based authentication and software tokens with a four-tier hardware identity model. Each device is classified by the strongest cryptographic proof its hardware can produce. The WireGuard public key is bound to a hardware-anchored LDevID certificate (IEEE 802.1AR), rotated every 24 hours.

TierNameHardwareProofAssurance
TIER 0OnDieSiliconiSIM, EID (GSMA SGP.02)Key generated on-die, never exportedHighest — physically impossible to extract
TIER 1DiscreteSecureElementTPM 2.0, Android StrongBoxTPM2_Quote over PCRs, EK cert chainHigh — discrete tamper-resistant module
TIER 2TrustedExecutionEnvironmentIntel TXT, ARM TrustZone, Apple SETEE attestation, DeviceCheck tokenModerate — firmware-isolated execution
TIER 3SoftwareOnlyECDSA P-256 in process memoryKey binding check, signature verificationLowest — policy decides enforcement

Policy enforcement by trust tier: The eBPF policy map (LPM_TRIE) stores a minimum trust tier per destination prefix. A Tier 3 device can reach internal infrastructure. Reaching a regulated data jurisdiction requires Tier 1 or higher. This is enforced at the kernel level — no application can override it.

05Behavioral Attestation Chains

Identity certificates answer "who started this?" but cannot answer "what happened after?" — especially for AI agents that can be hijacked mid-session. TunnelMind's attestation layer records what happened, not who claimed to do it.

EVENT 0 (GENESIS) event_hash: a3f7... prev_hash: 0000... src_class: AGENT verdict: AUDIT sig: Ed25519 ✓ merkle_root: 9c2e... EVENT 1 event_hash: b8d1... prev_hash: a3f7... ← src_class: HUMAN verdict: ALLOW sig: Ed25519 ✓ merkle_root: d4a0... EVENT 2 event_hash: c5e9... prev_hash: b8d1... ← src_class: AGENT verdict: BLOCK sig: Ed25519 ✓ merkle_root: f103... EVENT N ··· chain continues → TAMPER ANY EVENT → ALL SUBSEQUENT HASHES BREAK Detection is mathematical. No trust required. HASH-LINKED CHAIN + MERKLE TREE + Ed25519 SIGNATURES
Fig. 3 — Attestation chain. Each event references the previous hash. Merkle tree enables inclusion proofs. Ed25519 signs every event.

What Each Event Records

Network Facts
src/dst IP, port, protocol, bytes — from eBPF, not userspace
Enrichment
ASN, organization, country, jurisdiction (EU/US/CN/RU/FIVE_EYES)
Classification
Source class (HUMAN or AGENT), destination category, inferred data types
Agent Provenance
Framework, model, system prompt SHA-256, invocation chain, authorizer
Policy Verdict
ALLOW / WARN / BLOCK / AUDIT — with rule ID and reason
Attestation Bundle
Event hash, chain position, Merkle root, software version, eBPF hash, policy hash, Ed25519 signature

System prompt hashing, not logging: The agent's system prompt is stored as a SHA-256 hash — never the prompt text. This proves the prompt existed and was unchanged without leaking proprietary instructions.

06Enterprise: Agent Governance & Compliance Export

Scenario — The Compliance Question

A CISO asks: "Show me every packet my AI agents sent to a Chinese-controlled ASN in the last 30 days, prove cryptographically that none of them contained PII, and generate a signed report I can give to my auditor."

TunnelMind answers in under 10 seconds with hardware-anchored proof. That capability does not exist anywhere in the market today.

The Compliance Export

One click generates a signed ZIP archive verifiable by anyone with openssl and jq. No TunnelMind software is required for verification.

FileFormatContents
events.jsonNDJSONAll events in range, one per line, machine-readable
chain_summary.jsonJSONChain length, head hash, signing key ID, policy hash, time range
violations.jsonJSONVIOLATION and CRITICAL events only — the audit trail
verify.shBashSelf-contained verification: hash integrity, Ed25519 sigs, chain linkage
signing_key.pemPEMEd25519 public key for the signing period
README.txtTextAuditor instructions and field definitions

Default Policy Rules

13 rules ship out of the box. Hot-reloadable YAML — changes take effect within 5 seconds. The SHA-256 of the policy file is embedded in every attestation bundle.

RuleVerdictTrigger
CRED-CRITICALBLOCKCredentials sent to suspicious destination
AGENT-GOV-BLOCKBLOCKAgent → government-attributed infrastructure
EU-PII-BLOCKBLOCKPII sent to data broker — GDPR Art. 5
EU-HEALTH-BLOCKBLOCKHealth data — GDPR Art. 9 special category
CN-PII-BLOCKBLOCKPII or financial data → China jurisdiction
AGENT-SOURCECODE-AUDITAUDITAgent sending source code externally
SURVEILLANCE-WARNWARNTraffic to known surveillance actor
DATA-BROKER-WARNWARNTraffic to known data broker
DEFAULT-ALLOWALLOWNo rule matched — nominal traffic

07Consumer: Surveillance Visibility

The consumer product inverts the surveillance equation. Every tracker, data broker, and fingerprinting script that watches a user is identified, attributed to its corporate parent, mapped to its regulatory jurisdiction, and assigned a dollar value estimate.

YOU 10.10.0.2 Google US · PRISM Meta US Amazon US Criteo EU ByteDance CN Baidu CN Acxiom BROKER Oracle BROKER NSA GOV US EU CN DATA BROKER GOV ATTRIBUTED Node size ∝ log₂(bytes)
Fig. 4 — Surveillance graph. Real-time force-directed graph of every entity observing your traffic.

Intelligence Pipeline

1
DNS CaptureEvery DNS query intercepted on the WireGuard interface. Three-tier classification: known tracker → domain heuristic → LLM inference.
2
Corporate AttributionEntity → parent company → ultimate owner. Jurisdiction tagging. Intel program attribution (PRISM, FIVE_EYES, FISA 702).
3
Behavioral FingerprintingBeacon detection: interval regularity, timing patterns, trigger type. Identifies trackers by network behavior, not domain.
4
Exposure ScoringComposite surveillance exposure score. "The cost of you" — estimated annual data value from broker pricing models.
5
EnforcementDNS sinkhole (NXDOMAIN), eBPF packet drop, or platform-native blocking. Natural language control via MCP.

08The Shadow BGP Dataset

Every TunnelMind node — enterprise or consumer — passively observes BGP routing from its vantage point. These observations are cryptographically signed by the node's hardware identity and aggregated into a distributed dataset that answers questions no commercial dataset can.

The flywheel: Every consumer user is a sensor node. Their anonymized telemetry enriches the shadow BGP dataset that powers the enterprise intelligence layer. More enterprise value drives more investment. More investment funds more consumer features. Free product. Priceless dataset.

Prefix Hijack Detection
Observed origin AS ≠ RPKI-authorized origin → signed alert in real time
Jurisdiction Mapping
IP → prefix → origin AS → ownership chain → legal jurisdiction
Route Path History
Full AS path for every observed prefix. Temporal routing analysis.
Anomaly Feed
Live stream of BGP anomalies. RPKI validation via RTR protocol (RFC 8210).

09What TunnelMind Deliberately Does Not Build

ExclusionRationale
Agent identity certificatesA cert proves who started. It can't prove what happens after prompt injection. Behavior attestation scales. Identity doesn't.
Profile poisoningContradicts observation-only thesis. Degrades telemetry integrity. Creates legal surface area.
BGP route injectionRead-only observer. Never announces or modifies routes. Trust boundary and legal boundary.
Centralized data lakesTelemetry stays at the node. Aggregation per control plane instance. Federated by design.
Cloud LLM inferenceLocal LLM only (Ollama + Mistral 7B). No data leaves the node for inference.

10Standards & Compliance

StandardApplication
IEEE 802.1AR-2018LDevID certificate structure. 24hr TTL. Hardware-anchored identity.
TCG TPM 2.0 §18.4TPM2_Quote for PCR attestation. AK never exported.
GSMA SGP.02eUICC/iSIM EID — Tier 0 identity. On-die key generation.
NIST SP 800-207Zero Trust Architecture principles for policy enforcement.
RFC 4271 (BGP-4)Shadow BGP observation and AS path recording.
RFC 8210 (RTR)RPKI validation for prefix origin verification.
NIST FIPS 186-5Ed25519 digital signatures on attestation events.
NIST PQC ML-KEMPost-quantum key exchange readiness on WireGuard.
GDPR Art. 5, 9, Ch. VData processing, special categories, cross-border enforcement.

11Market Position

Enterprise Network Security
$22B+ TAM — agent governance, zero trust, compliance
Privacy Tools
$2B+ TAM — surveillance visibility, tracker blocking
Threat Intelligence
$12B+ TAM — BGP anomaly detection, jurisdiction mapping
Pricing Anchor
GDPR fine risk (€20M max) — not software budgets

Competitive moat: The shadow BGP dataset cannot be replicated without the deployed sensor network. The eBPF enforcement layer requires deep kernel networking expertise. The attestation chain architecture is patent-defensible. No current vendor operates at the kernel enforcement layer with hardware-anchored identity and cryptographic behavioral proof.