Technical Architecture Brief

The Hybrid Paradox:
Resolving Strategy vs. Security

How the "Hybrid Integration Strategy" (Text A) and "Perimeter Defence" (Text B) fit together to form a cohesive, secure system.

1

The Connectivity Paradox

The Conflict

Text A says: Staff access a "Progressive Web App (PWA)" via a "Secure URL".

Text B says: The system has "Zero Inbound Ports" and is "invisible to external port scanners."

Question: How can staff access a web app if there are no open ports?

The Resolution

Cloudflare Tunnels (Outbound-Only)

The system uses a technology (referenced as "Cloudflare Tunnels" in Text B) that creates a reverse connection.

Instead of opening a hole in your firewall (Inbound Port 80/443), the local Sentinel server makes an outbound connection to the Cloudflare edge network.

Result: The staff gets a web interface, but to a hacker scanning your office IP address, the server looks completely offline (Invisible) because no ports are open.

Global Access, Local Sovereignty

This is often the hardest part to visualize because we are used to the idea that "Local Server = Local Wi-Fi Only." In this system, your staff can be on 4G/5G in a van, on hotel Wi-Fi in another country, or at home, and the app will work exactly as if they were sitting in the office.

The "Cell Tower to Bunker" Path

1. The Mobile Device

The driver opens the app (PWA) on their phone. To them, it looks like a normal website (e.g., portal.yourcompany.com).

2. The Public Internet

The phone sends the message via the local cell tower to Cloudflare. Crucial Point: The phone does not know where your office is. It doesn't need your office IP. It only needs to find Cloudflare (which is everywhere).

3. The Hand-Off

Cloudflare receives the message at its nearest data center. It checks its list and sees: "Ah, this traffic belongs to the secure tunnel connected to [Your Company] Office."

4. The Local Vault

Cloudflare pushes the message down the pre-established "outbound" tunnel line into your physical server. Your server receives the data, processes it locally, and stores it on the hard drive under your desk.

Why this is better than a VPN

Old School VPN
  • Open a VPN app.
  • Wait for it to connect to the office.
  • Hope the office internet isn't blocking incoming connections.
  • Open the web browser.
The Sentinel Strategy

The user just opens the URL. The "Tunnel" handles the complexity in the background. The experience for the driver is identical to using WhatsApp or Gmail—it just works over the internet, but the data ends up on your desk, not in Silicon Valley.

"Global Accessibility (works on any internet connection) while maintaining Local Sovereignty (data physically lives with us)."

Summary of Alignment

Cross-referencing Strategy vs. Defence.

Feature Text A (Strategy Report) Text B (Perimeter Defence) How it Fits
Network "Hard Line (Secure Tunnel)" "Cloudflare Tunnels... Outbound-only link" The Tunnel is the Hard Line. It connects the PWA to the Local Vault securely.
Privacy "Scrubs all sensitive data before it leaves" "PII redaction happens on the local CPU" The Local Unit acts as a filter; the Cloud AI only sees clean data.
Storage "Your data stays in the office" "Data never rests on third-party servers" Cloud is used for thinking (CPU cycles), not remembering (Hard Drive storage).

Conclusion

There is no contradiction. Text B explains the security mechanism (Zero Trust/Tunnels) that makes the operational strategy in Text A (Hybrid AI/PWA) safe to deploy. The "Gatekeeper" mentioned in Text B is the physical machine that enables the "Split-Brain" described in Text A.

©2025 Office AI Sentinel. All rights reserved.