Frequently Asked Questions

Generic guidance on our infrastructure, security practices, and operational philosophy. No operational details are disclosed here.

An encrypted tunnel is a secure communication pathway where data is wrapped in multiple layers of encryption before transmission. Even if an observer intercepts the traffic, they cannot determine the content, origin, or destination. Think of it as a sealed pipe through a hostile environment—what goes in at one end is unreadable to anyone except the intended recipient at the other.

A private mesh network is a decentralized communication system where every node (participant) can relay traffic for every other node. There is no central server to seize, monitor, or shut down. If one node goes offline, the network automatically reroutes through available paths. It is resilient by design—removing nodes strengthens, rather than weakens, the remaining connections.

All personally identifiable information is encrypted with AES-256-GCM before it ever touches our database. The encryption keys are never stored alongside the data. Even in the event of a complete database breach, the attacker would possess only meaningless ciphertext. We do not retain logs of who accesses what, and we do not share data with any third party.

The vetting process is designed to verify that applicants understand and align with the 12 Standards. It involves identity confirmation, background review, and direct communication with a vetter via encrypted channels. The process typically takes between 48 hours and two weeks. We do not disclose specific vetting criteria publicly.

There is a one-time background check fee to cover the cost of verification services. This fee is non-refundable and goes directly to the third-party verification provider, not to ARMOR. No ongoing dues or membership fees are required. The network is funded through voluntary contributions from active members.

Yes. Membership is entirely voluntary. You may request deletion of your application data at any time, and we will purge it from our systems within 30 days. Note that once you have been granted access to internal channels and resources, you are expected to maintain operational security even after departure. What you learned stays protected.

The network employs a combination of end-to-end encrypted messaging, self-hosted infrastructure, and open-source security tools. We do not rely on commercial platforms that can be subpoenaed or shut down. All critical services run on infrastructure that the network controls directly. Specific tool names and configurations are shared only with verified members.

After submitting your application, you can request a secure status link from the portal. Enter the email address you used on your application, and a one-time magic link will be generated and sent to you. This link expires after 24 hours for security. We do not send unsolicited status updates.