YuraNetwork’s strongest privacy feature isn’t a checkbox — it’s the architecture: a private DNS namespace (.yura) that is hard‑blocked from the public internet and only exists for tunnel clients.
No ad SDKs. No marketing pixels. We don’t build a surveillance pipeline.
Diagnostics exist for reliability, not profiling. We avoid collecting what we don’t need.
Bug reports are user-submitted; you decide what to include.
Reports submitted via /bug-report are stored as plain text files for the dev team to reproduce issues. Don’t paste passwords, private keys, or seed phrases.
Most “private hosting” systems fail in one place: they still expose a public surface that can be scanned, crawled, and enumerated. YuraNetwork flips that: the .yura namespace is inside-only, and the gateway enforces that boundary at the edge.
nginx blocks .yura unless the client is inside the tunnel subnet (10.77.0.0/24). This prevents public scanning and crawling by design.
.yura resolves via tunnel DNS (10.77.0.1). There’s no public DNS listing to scrape, mirror, or index.
WireGuard encrypts client↔gateway traffic. You aren’t punching random public ports through your router.
Public portal uses standard web PKI. Private .yura browsing uses the Yura Root CA + revocation list.
Admin-only / expensive actions (example: search reindex) must be token-gated to prevent abuse (DoS-style load) and reduce exposure.
.yura blocked unless inside tunnel subnet10.77.0.1).yuraPublisher/site key rotation exists in the system design for operational hygiene.
Discovery happens via yurasearch.yura inside the tunnel — not on public pages.
Public portal is documentation + onboarding. Private namespace is the network. No confusion.
Tunnel onboarding uses a single-use tokenId + tokenSecret. Unused tokens expire quickly (default ~20 minutes). This reduces linkability and limits replay.
Publishing uses a publisher identity (publisherId) and per-site keys (siteKey) so you can update targets and rotate credentials without re-installing clients.
We keep operational logs focused on reliability and abuse prevention, with retention limits. Where possible, we prefer minimized/hashed references over raw identifiers.
| Claim | Why it holds | Limit |
|---|---|---|
| Public internet cannot crawl/enumerate .yura | Hard edge block enforces tunnel membership before routing. | If you publish something on the public web, that’s outside the tunnel model. |
| Tunnel traffic is encrypted | WireGuard provides encrypted client↔gateway transport. | Endpoints still must be secured like any server/app. |
| No public directory of private domains | Discovery is inside-only (yurasearch.yura), public site does not list. |
Connected users can still share domains with each other. |
| Provisioning links expire | Single-use tokens with short TTL reduce replay/linkability. | Long-lived publisher/site keys are still needed for operations. |
yurasearch.yura)