Security & Compliance

  • End-to-end TLS with certificate validation by default.
  • Sensitive operations are written to audit logs (key creation, permission changes, quota updates).
  • Organization-level RBAC with least-privilege access.
  • Anomalies trigger automatic throttling, blocking, or manual review.

Contributor Rights Boundaries

  • Contributors can pause sharing at any time and exit the scheduling pool immediately.
  • Supports local policies such as Wi-Fi only, charging only, and daily limits.
  • The platform does not require exposure of local business data.

FAQ

Q: Can enterprises keep a fixed exit IP?

Yes. Use sticky sessions with ttl_seconds.

Q: How can I reduce 429/503 responses?

Lower concurrency, use exponential backoff, relax geo constraints, and configure multi-zone failover.

Q: What happens if a contributor goes offline?

The node stops carrying requests immediately and no new earnings are generated.

Q: How should API keys be secured?

Use a secret manager, rotate keys regularly, and never store keys in plaintext on frontend or client apps.

Back to Documentation Home