Data protection policies must include in transit and at rest considerations, while
very good open standards exist for secure data transmission the same is not true for local
data persistence. To tackle this need we introduce the TRED
protocol, a simple, extensible
and performant mechanism to securely manage sensitive data at rest.
Some of its characteristics include:
- Support for modern and robust ciphers Chacha20 and AES256.
- Good performance and little overhead on per-data-packet.
- Prevent manipulation attempts on generated ciphertext.
- Prevent reordering of data packets.
- Prevent leaking information when attempting to process manipulated data packets.
- Prevent overflows when processing large data streams.
You can directly download the binary from the published releases.