FEATURES SCREENSHOTS DOWNLOAD FAQ CHANGELOG

TRUSTNOWIRE

Trust no wire -- including ours. Here's the proof.

REAL-TIME NETWORK MONITORING AND THREAT DETECTION FOR WINDOWS

EVERY CONNECTION EVERY PROCESS EVERY BYTE
DOWNLOAD v1.0.1

FEATURES

LIVE CONNECTION TABLE

Every active TCP connection (IPv4) with process name, remote IP, port, country, and Authenticode signature verification — UDP and IPv6 tables planned for v1.1

PACKET CAPTURE

Real-time bandwidth monitoring via Npcap with per-connection byte counters and a live sparkline graph

DNS LOGGING

Intercepts and logs all DNS queries with response IPs and TTLs

THREAT SCORING

Automatic risk assessment based on process trust, port usage, traffic patterns, hosting provider reputation, and more

VIRUSTOTAL INTEGRATION

Auto-scan and manual scan of remote IPs against the VirusTotal database with your own API key

GEO-IP LOOKUP

Country and city resolution for every remote IP via ip-api.com batch API

WIDGET MODE

Win7-gadget-style micro dashboard showing live stats, bandwidth graph, and top threats at a glance

SYSTEM TRAY

Minimize to tray with tooltip, left-click restore, right-click menu

5 THEMES

Iron Man, Stealth, Cyberpunk, Light, Matrix -- each with matching glow effects

3 DISPLAY MODES

Compact, Normal, Expanded -- auto-resizes to fit your workflow

SCREENSHOTS

TrustNoWire Iron Man theme Expanded mode screenshot

DOWNLOAD

v1.0.1
Windows 10 or 11 (64-bit)
Npcap installed (free from npcap.com)
Administrator privileges

FAQ

ABOUT

TrustNoWire is built by LXB Studio LLC. This source code is public so you can verify exactly what it does on your machine. A network monitor you can't audit is a network monitor you shouldn't trust.
TrustNoWire is a real-time network monitoring and threat detection application for Windows. It watches every connection, every byte, and every process on your machine and shows you exactly what is happening. Built with Tauri 2 (Rust backend) and React, it runs as a lightweight desktop app with full packet capture, DNS logging, geo-location, threat scoring, and VirusTotal integration.
Npcap is the Windows packet capture library that allows TrustNoWire to intercept and analyze raw network packets. It is required for bandwidth monitoring, DNS logging, and deep packet inspection. Download it free from npcap.com.
Create a free account at virustotal.com, copy your API key from your profile, and paste it in TrustNoWire Settings. Auto-scan is rate-limited to 4 requests per minute on the free tier.
TrustNoWire is source-available under the Business Source License 1.1. You can read, audit, and build the code for personal use. The license converts to MIT on 2030-02-09. See the full LICENSE.md in the GitHub repository.
Windows 10 or 11 (64-bit), Npcap installed (required for packet capture), and Administrator privileges for raw packet capture and full process visibility.

CHANGELOG

v1.0.1
2026-04-27 -- SECURITY & PRIVACY HARDENING
Authenticode code signing via Azure Trusted Signing — installer, MSI, and inner application all signed by LXBSTUDIO LLC; no more “publisher unknown” warning on first launch
Strict Content Security Policy enforced on the embedded WebView, hardening the in-app browser against any future UI exploit
Geo enrichment is now opt-in and off by default — no remote-IP data leaves your machine until you flip the toggle in Settings
Geo lookups switched from cleartext HTTP (ip-api.com) to HTTPS (ipinfo.io), with a built-in 30-day rate limiter
VirusTotal API key now persists across restarts; added a Clear button in Settings, and the key is never returned to the frontend
New “VT MALICIOUS” threat flag with engine detection count surfaced in the Why-flagged panel
External-link surface area scoped down: the in-app shell can only open the official LXB Studio site, nothing else
Fixed: per-connection bandwidth counters no longer drop bytes during the periodic refresh on busy connections
Fixed: threat score for high-outbound connections no longer double-counts the same condition
Fixed: IPv6 traffic now contributes to per-connection counters (previously skipped)
Fixed: in-memory caches (DNS, geo, VirusTotal results, process info) now bounded with LRU eviction — long sessions no longer leak memory
Expanded-view connection rows redesigned: cleaner column geometry, ellipsis on long hostnames and orgs, port number moved into the row header
No telemetry, no analytics, no auto-update channel — the only opt-in network calls are documented in the README’s new Privacy section
v1.0.0
2025-02-09 -- INITIAL RELEASE
Live connection table with process resolution, country lookup, and Authenticode verification
Real-time packet capture and bandwidth monitoring via Npcap
DNS query interception and logging with response IPs and TTLs
Automatic threat scoring with multi-factor risk assessment
VirusTotal integration (auto-scan and manual scan)
Geo-IP lookup via ip-api.com batch API
Win7-gadget-style widget mode (200x290)
System tray with minimize, restore, and quit
5 themes: Iron Man, Stealth, Cyberpunk, Light, Matrix
3 display modes: Compact, Normal, Expanded
Frameless transparent window with custom title bar
Admin elevation via UAC manifest in release builds

INSTALLER VERIFICATION

Authenticode-signed by LXB Studio LLC. Starting with v1.0.1, every TrustNoWire artifact — the installer, the MSI, and the application binary inside the installer — is code-signed via Microsoft’s Azure Trusted Signing service. Right-click any download → PropertiesDigital Signatures to see the “LXBSTUDIO LLC” publisher entry and verify the chain back to a Microsoft Code Signing CA.

On first launch you should see a clean UAC prompt that lists LXBSTUDIO LLC as the verified publisher. If your build of Windows hasn’t cached our signing reputation yet, SmartScreen may still ask you to confirm — click More infoRun anyway. Reputation builds quickly across users; the signature itself is what matters.

🔒 SHA-256 hashes for v1.0.1. The Authenticode signature above is your primary proof of authenticity. These hashes are here as an extra reference if you’d like to confirm the bytes you have on disk match the bytes we shipped.

TrustNoWire_1.0.1_x64-setup.exe
215179a3f8781103042551766b62ea00d451c636b0cfb34cb098998167fc1bf6
TrustNoWire_1.0.1_x64_en-US.msi
08e155a35222f46fced83afa89cee1364431fb204eff9b96050e499fdf75d000

Step 1 — open PowerShell in the folder where you downloaded the installer. For most users that’s the Downloads folder, so paste this in any PowerShell window:

cd $env:USERPROFILE\Downloads

Step 2 — verify the SHA-256 hash (use the line that matches your downloaded file):

Get-FileHash TrustNoWire_1.0.1_x64-setup.exe
Get-FileHash TrustNoWire_1.0.1_x64_en-US.msi

The Hash column in the output must match the SHA-256 value shown above for that file exactly.

Step 3 — verify the Authenticode signature (do this for whichever artifact you plan to run):

Get-AuthenticodeSignature TrustNoWire_1.0.1_x64-setup.exe | Format-List *
Get-AuthenticodeSignature TrustNoWire_1.0.1_x64_en-US.msi | Format-List *

You should see Status : Valid and a SignerCertificate.Subject that begins with CN=LXBSTUDIO LLC, issued by Microsoft ID Verified CS EOC CA 03. When both checks pass, you have the official LXBSTUDIO LLC release.