Security Architecture

Built with Security by Design principles.

At Rederel, we believe remote access should be effortless yet uncompromisingly secure. We built our architecture to ensure we never hold the keys to your device.

1. How It Works (Simple Version)

Most remote tools work by "opening a door" on your computer. This can be dangerous. Rederel uses a Reverse Connection model ("Meeting in the Middle").

[ DEVICE ] --------> [ RELAY SERVER ] <-------- [ YOU ]
(Outbound)         (Meeting Point)         (Outbound)

The 5 Steps of a Secure Connection:

  1. Your Device calls out: The Agent connects securely to our Relay saying — "I am ready."
  2. Discovery: You log in and see your active agents instantly.
  3. You call out: When you click "Connect," your browser also connects outbound to the Relay.
  4. The Handshake: The Relay introduces the two connections.
  5. The Auth Wall: CRITICAL: Your Device demands a password. This check happens on your device, not our server.

2. Technical Deep Dive

For IT Administrators and Security Engineers.

1. Attack Surface Reduction (ASR)

Rederel eliminates the need for listening ports (TCP 3389/5900). The Agent uses only standard outbound TLS connections (TCP 443). This renders port scanners and brute-force network attacks useless.

2. The Relay Bridge

The Relay acts strictly as a low-latency packet forwarder. It authenticates the validity of the connection token but cannot decrypt the local authentication challenge password, which is hashed client-side.

3. Decentralized Authentication

We implement Local Authority authentication. The plain-text password is never sent over the network. We verify the SHA-256 hash against the agent's local configuration.

← To Dashboard via login