Transport: ED25519 + X25519
- Every agent generates an ED25519 identity keypair at install.
- Registration with rendezvous uses signed payloads.
- Session establishment uses X25519 ECDH key exchange.
- Session keys are ephemeral and not persisted.
TucDesk's zero-trust architecture encrypts sessions end-to-end, cryptographically signs every audit entry, and gives operators full control over what runs on their infrastructure.
TucDesk separates identity, transport, session encryption, and audit signing so compromise in one layer does not automatically expose plaintext or administrative control.
| Data category | Cloud | Self-Hosted |
|---|---|---|
| Session recordings | Encrypted at rest in R2 | Encrypted in your MinIO/S3 |
| Audit logs | Stored in TucDesk Postgres | Stored in your Postgres |
| Agent metadata | TucDesk Postgres | Your Postgres |
| Session traffic | E2E encrypted, relay has no access | E2E encrypted, relay has no access |
| Operator credentials | Hashed, TucDesk Postgres | Hashed, your Postgres |
| TucDesk visibility | Analytics, usage, billing | None at runtime |