Agent keeps the TLS key
Your agent serves the certificate and terminates TLS for the tunnel route.
Start a public tunnel in seconds while keeping TLS termination on your agent. Use proof endpoints and fingerprint checks to verify what mode your route is running in.
The trust boundary is simple: your agent handles TLS identity, the relay handles routing.
Your agent serves the certificate and terminates TLS for the tunnel route.
The relay uses SNI and forwards opaque traffic to the connected agent.
Use --e2ee=false only when you want traffic inspection for debugging.
Proof over promises
Check mode labels, proof JSON, and fingerprint matches to confirm what is running in production.
Dashboard and agent output should show Verified for blind relay routing.
Confirm blind_relay: true for the route you exposed.
Ensure the agent fingerprint matches the public proof entry.
These checks give you concrete evidence that the route is running in verified mode with agent-held TLS identity.
Start local, publish encrypted, then verify mode.
# macOS (Apple Silicon)
curl -fsSL https://storage.googleapis.com/nfltr-downloads/latest/nfltr-darwin-arm64 \
-o nfltr && chmod +x nfltr
# Linux (x86_64)
curl -fsSL https://storage.googleapis.com/nfltr-downloads/latest/nfltr-linux-amd64 \
-o nfltr && chmod +x nfltr
# Verified mode by default
nfltr http 8080
# Optional stable endpoint
nfltr http 8080 --name my-api --api-key $NFLTR_API_KEY
# Inspect proof artifacts
open https://nfltr.xyz/proof/my-api.json
# Compare fingerprint from agent output
# with tls_fingerprint in proof JSON
Single binary for Linux, macOS, Windows, ARM, and WASM.
Latest: latest
Start fast, then verify exactly how the route is handled.