Transparency report
What we see.
What we don't.
Updated May 2026 · Covers network alpha period
Network status
Devnet alpha — mainnet nodes pending operator onboarding
US, GB, DE, JP, SG, NL, CA, AU, FR, BR, IN, KR
Testnet only — no production traffic yet
Staking and payouts activate with mainnet launch
Pre-launch
What AEGIS logs
The following is the complete list of data we retain per request. If it is not listed here, we do not log it.
Not stored — not useful to us without identity
Never written to disk; only used for the TCP handshake
Encrypted in transit; exit node sees destination, not identity
Required for deducting balance; not linked to traffic
Aggregated per session for billing; no per-request breakdown
Start/end time only, for metering
Used to route to the correct exit node
Immutable Solana ledger; not controlled by AEGIS
How the routing works
When you make a request through AEGIS, your traffic takes the following path. No single hop in this chain can see both who you are and what you are fetching.
Legal requests received
We publish every government or law enforcement request we receive. Because our architecture is designed so we have nothing to hand over, our response to all data requests is the same: we have no data responsive to this request.
Warrant canary: as of May 2026, AEGIS has never received a national security letter, FISA order, or gag order of any kind. This statement will be removed if that changes.
Source code
AEGIS is open source. The smart contracts, orchestrator, node daemon, SDKs, and this web app are all publicly auditable. We encourage security researchers to review our code and disclose vulnerabilities responsibly.