StreamGate

Public product, policy and company pages.

Security

Private service routing without broad network exposure.

A service-shaped security model for controlled private delivery.

Transport and session protection

StreamGate keeps one public relay edge and one secure external transport layer while still performing an authenticated application-level secure handshake before payload frames are switched.

Public edge

Nodes connect to M through one stable secure public entrypoint, which keeps the externally exposed surface predictable and compact.

Inside the relay

After the outer TLS layer is established, StreamGate applies its own handshake and encrypted payload framing so that sessions are not switched before trust is established.

Scoped routing

Routes stay attached to node identities, app instances are individually addressable, and access keys bind users to only their own nodes, sessions and routes.

Controlled rollout

Client and server versions are tracked centrally so operators can manage updates, revoke access and contain stale deployments more cleanly than with ad-hoc tunnels.

Operational security posture

Security in StreamGate is primarily about minimizing scope.