Defense and intelligence applications demand more than accurate spatial data — they require provable data provenance, strict control over where data resides and transits, and verifiable chain of custody from sensor to analyst. Vangrid is built for exactly these requirements. Every observation is cryptographically signed at the edge before transmission, data sovereignty boundaries are enforced at the infrastructure level, and raw sensor streams never leave the originating node. The result is a spatial intelligence platform you can deploy in mission-critical environments with confidence that the data you receive is authentic and has not been intercepted or tampered with.Documentation Index
Fetch the complete documentation index at: https://docs.vangrid.io/llms.txt
Use this file to discover all available pages before exploring further.
Defense-tier capabilities
Cryptographic provenance
Every data point carries a provenance hash encoding node identity, capture timestamp, and observation content. Any alteration to the data invalidates the hash — giving you tamper-evident proof of integrity from sensor to delivery.
Data sovereignty controls
Queries are routed exclusively through nodes within your designated sovereignty boundary. Data does not transit infrastructure outside that boundary unless you explicitly authorize cross-region access.
Edge-computed privacy
Raw sensor streams — imagery, depth data, point clouds — are processed on-device and never transmitted. Only derived spatial features leave the node, enforcing privacy at the hardware layer, not as a software policy.
Access-controlled spatial queries
Fine-grained access controls let you restrict which users, systems, or API keys can query specific geographic zones, data tiers, or provenance-verified datasets.
Defense use cases
Situational awareness
Vangrid streams continuous ground truth over areas of operational interest, giving analysts and command systems a live, corroborated spatial picture without requiring forward-deployed sensor infrastructure. Because observations are cross-validated by multiple independent edge nodes, theground_truth_score gives you a quantitative measure of observational confidence for any given area.
Border and perimeter monitoring
Define a polygon AOI along a border or perimeter and subscribe to a streaming feed. Vangrid delivers observations as they arrive from edge nodes in the zone, so your monitoring systems receive updates in real time rather than on scheduled imagery cycles.Critical zone surveillance
Establish spatial subscriptions for sensitive zones — installation perimeters, airspace corridors, maritime exclusion areas — and configure alert thresholds based onground_truth_score and observation type. High-confidence anomalies are surfaced immediately; low-confidence signals are flagged for analyst review rather than silently dropped.
Data sovereignty: how residency and access controls work
When you provision a defense-tier Vangrid account, you specify one or more sovereign regions. Vangrid enforces three guarantees within those regions:In-region routing
Your API queries are routed only to edge nodes within your designated sovereign region. No observation data transits nodes or infrastructure outside that boundary.
Encrypted transit
All data moving from edge nodes to the Vangrid aggregation layer and from the aggregation layer to your endpoint is encrypted in transit using TLS 1.3. The provenance hash is computed before encryption and verified after decryption, so any interception or modification is detectable.
Defense-tier access, sovereign region configuration, and advanced access controls are available through a dedicated enterprise agreement. Contact hello@vangrid.io to discuss your requirements and initiate onboarding.
Verifying provenance on a spatial response
After receiving a spatial query response, verify itsprovenance_hash to confirm the payload has not been altered. The following example shows how to perform this verification.
Relevant concepts
Cryptographic provenance
How provenance hashes are constructed, what they encode, and how to use them for audit and verification.
Data sovereignty
How sovereign regions work, how routing is enforced, and how to configure access boundaries for your account.
Edge-computed privacy
Why raw sensor streams never leave the node and what this means for operating in sensitive environments.