Features

Everything you need for secure, fast remote desktop access.

End-to-End Encryption

CORE SECURITY

Every session is protected with ECDH P-256 key exchange and AES-256-GCM encryption. The relay server never sees your data — not your screen, not your keystrokes, not your files. Even if the relay is compromised, your session remains completely private.

Ephemeral ECDH P-256 key exchange per session
AES-256-GCM authenticated encryption on all streams
Perfect forward secrecy — past sessions can't be decrypted
Relay-blind architecture — relay only sees ciphertext
Client
AES-256-GCM
Relay
(blind)
AES-256-GCM
Host

Ultra-Low Latency

QUIC transport with hardware-accelerated video encoding delivers a smooth, responsive experience even on slow networks.

  • QUIC protocol with TLS 1.3 transport
  • Hardware-accelerated AV1 & VP9 encoding
  • Hybrid tile pipeline — only changed regions are sent
  • Sub-20ms latency on local networks

Full Remote Control

Control remote machines as if you were sitting in front of them, with full keyboard, mouse, and multi-monitor support.

  • Keyboard and mouse input with privileged service
  • Multi-monitor support with display switching
  • Clipboard sync (text and images)
  • Audio streaming from remote host

Flexible Authentication

Multiple authentication methods to fit any workflow — from quick one-time passwords to zero-password trusted device access.

  • One-time passwords (OTP) for quick access
  • Permanent passwords for unattended access
  • Trusted device keys (ECDSA challenge-response)
  • TOTP two-factor authentication

Flexible Deployment

Install with a full installer, run portable from a USB drive, or deploy separate Host and Client builds.

  • Full, Host-only, and Client-only builds
  • Portable single-EXE — no installation needed
  • Windows service for privileged input injection
  • Auto-start with minimize to system tray

Remote Diagnostics

Real-time system monitoring without interrupting the user — CPU, RAM, disk, network, and running processes at a glance.

File Transfer

Bidirectional file transfer between host and client with end-to-end encryption. Drag and drop or use the built-in file browser.

Relay Server

Connect through firewalls and NAT with the DeskUltra relay. All relayed data is end-to-end encrypted — the relay is just a blind pipe.