AUTHENTICATED POST-DEPLOYMENT CONTROL
Access codes. Device limits. Revocation. The system that controls who runs what.
THE PRINCIPLE
Each access code is tied to device fingerprints. Sharing is tracked. Limits are enforced. Revocation is permanent.
THE PROCESS
Create access codes from dashboard. Assign labels. Set device limits.
Codes are cryptographically random. 64 bits of entropy.
Send codes via email or share directly. Each code is unique.
Email delivery available. Patreon integration supported.
User enters code on first launch. Device is fingerprinted.
Fingerprint includes hardware identifiers. MAC, CPU, hostname.
Monitor active sessions. View device count. Revoke instantly.
Revocation takes effect immediately. No grace period.
THE FORMAT
CAPABILITIES
Set max devices per code. 1 to 10.
Tag codes for organization. Patron names, tiers.
Send codes directly. Automated tracking.
Instant. Remote. Permanent.
Revoked codes free slots after period.
Auto-generate for new patrons.
THE CONSTRAINT
START
Upload a build. Generate codes. Distribute. That is the system.