Blunt Threat Model

We can't see your screen.
And we don't want to.

Most remote tools work by sending your data to a cloud server, processing it, and sending it back. Relay is different.

Zero Cloud Proxy

Your connection is Direct. Data flows from your computer → your local router → your phone. If you are on the same WiFi, traffic never leaves your building.

mTLS Encryption

We use mutual TLS (mTLS) for all connections. Your phone generates a key. Your desktop generates a key. They exchange them directly. Even if someone intercepts the traffic, it is mathematically impossible to read without the private keys.

No "God Mode"

dotrly (us) has no backdoors. We cannot reset your keys. We cannot "tap in" to your session for support. If you lose your pairing, you must re-pair manually.

Open Source Clarity

Security through obscurity is a myth. The Relay Helper (the part that runs on your machine and has access to your files) is open source. You can audit the code, build it yourself, and verify that it does exactly what we say it does.

Audit on GitHub