Valurian Frequently Asked Questions

Valurian is built for demanding environments like sovereign, air-gapped, and disconnected networks. Below are the questions we hear most from security architects, compliance teams, and operations leads evaluating how it fits into their infrastructure.

Security & Encryption

Valurian is designed for high-assurance environments where trust, control, and visibility matter. This section answers common security questions around encryption standards, access restrictions, firewall compatibility, and how metadata is handled during transfers.

What encryption standards does Valurian use?

Valurian uses modern, enterprise-grade encryption protocols including AES-256 for data in motion.

Each file is broken into encrypted chunks, signed, and verified.

Can I restrict who’s allowed to send or approve files?

Absolutely. Valurian includes native role-based access controls and supervisor approval workflows.

You decide who can move what and enforce approvals where needed.

Do I need to change my firewall or network setup?

No. Valurian runs on standard ports and requires no special tunneling or VPNs.

You can deploy without touching your firewall.

Is Valurian secure and compliant for sovereign deployments?

It’s built for regulated and high-assurance environments.

Does Valurian expose any metadata during transfer?

No. Valurian protects both content and context. File names, paths, and metadata remain encrypted and are never exposed in transit.

File transfer behavior

Valurian was built to handle demanding file transfer conditions at scale. This section answers common questions about how it manages large payloads, resumes interrupted transfers, schedules movement, and operates in fully disconnected environments.

What file sizes can Valurian handle?

From 10GB to multiple terabytes.

Valurian reliably handles large datasets across poor networks and long distances.

How is Valurian better than syncing via USB drives?

USB is manual, error-prone, and hard to audit.

Valurian automates transfers with verifiability, access control, and full logging.

Can Valurian operate with zero internet access?

Yes. Valurian functions entirely offline, peer-to-peer.
No DNS, cloud authentication, or external services required.

Does it resume interrupted transfers?

Yes. Transfers resume from the last verified chunk.
Even across poor links or after downtime, Valurian picks up without loss.

Can I schedule or automate transfers?

Yes. Valurian supports push and pull automation, recurring jobs, and transfer rules based on content, node, or timing.

Compliance & Auditability

Built for teams that need proof, not just promises. These are the questions we hear from auditors, compliance leads, and regulators across GDPR, ISO 27001, and ANSSI.

What makes a file transfer “verifiable”?

A verifiable transfer means you can prove the file wasn’t altered, intercepted, or tampered with.

Valurian uses end-to-end hashing and logs every transaction from sender to recipient.

Does Valurian log who sent what and when?

Yes. Every transfer is automatically logged with timestamps, source/destination info, and transfer outcome.

You can export these logs for compliance reporting or audits.

Can I restrict who’s allowed to send or approve files?

Absolutely. Valurian includes native role-based access controls and supervisor approval workflows.

You decide who can move what and enforce approvals where needed.

Is Valurian compliant with GDPR or ISO 27001?

Yes. Valurian supports secure data handling practices aligned with GDPR, ISO 27001, and ANSSI recommendations.

It’s built for regulated and high-assurance environments.

Can I export logs for audits or external compliance tools?

Yes. Valurian lets you export detailed transfer logs in structured formats, ready for ingestion into SIEMs, compliance platforms, or long-term archives.

This supports external auditing, chain-of-custody reporting, and regulatory traceability.

Deployment & Offline Use

Valurian is built for real-world constraints, not cloud assumptions. These are the most common deployment questions from teams operating in air-gapped, sovereign, or offline environments.

Can it run inside sovereign or disconnected networks?

Yes. Valurian is built for classified, air-gapped, or sovereign environments with no external dependency.

Does Valurian require a centralized server?

No. It’s decentralized by design. Each node operates independently, discovering and routing via policy.

What infrastructure is required to deploy Valurian?

Minimal. Nodes can run on bare-metal, VMs, or containers even in isolated, low-resource environments.

Does it work on-site without an internet connection?

Yes. It doesn’t rely on cloud APIs, SaaS logins, or DNS.

Once deployed, it operates in complete isolation.

How does Valurian handle node discovery without DNS?

Valurian uses decentralized peer discovery and policy-based routing. Nodes identify each other locally or via predefined trust rules.

Architecture & Protocol

Valurian isn't based on legacy protocols or cloud-first assumptions. These questions explain how its architecture works, from swarm logic to scaling in sovereign and disconnected networks.

How does Valurian differ from Aspera or Resilio?

Valurian matches or exceeds their speed but is self-hosted, cloud-optional, and purpose-built for air-gapped, sovereign operations.

✅ No proprietary architecture
✅ Fully self-hosted
✅ Works in online, offline, or sovereign networks

What makes Valurian different from standard IPFS?

Valurian borrows from IPFS (like Merkle trees and content addressing), but is private, offline, and policy-enforced.

Does it work without a central index or DNS?

Yes. Discovery is handled peer-to-peer. Valurian doesn’t need external DNS, cloud brokers, or centralized registries.

What is swarm-based file transfer?

Files are split, signed, and transferred across multiple nodes in parallel to improve speed, fault tolerance, and scalability.

Can Valurian scale across hundreds of nodes?

Yes. The architecture supports many-to-many transfers, horizontal scaling, and autonomous peer discovery.

Still have questions about Valurian? Let’s Talk.

Whether you're evaluating Valurian for a classified deployment or need clarity on a specific use case, our team is here to help. We work closely with infrastructure, compliance, and security leads to ensure every requirement is covered, from protocol details to custom topologies.