Beacon
Confidential. Enforceable. Email.
The problem Beacon solves
You send a confidential email — pay information, legal documents, business agreements — and you don't know if it was opened, forwarded, or abused. Traditional email provides zero visibility or control after it leaves your mailbox.
That is where our project, Beacon, comes in.
It's not only an email system. It's a security layer on top of email, merging tracking, access control, and AI-based insights under one platform.
Beacon is an email security solution that inserts tracking and PIN-protected links into emails, providing visibility, control, and AI-led insights to mitigate misuse and forwarding.
How it works:
1.Every email you send includes a unique beacon and a secure link.
2.The recipient must enter a PIN (set up during onboarding) to unlock the content.
3.Our system logs every interaction — IP, device, timestamp — so security admins know exactly who opened it, when, and from where.
4.If someone forwards your email, we detect IP/device mismatches and flag and block it immediately instantly.
Why this matters:
Stops sensitive data leaks via email.
Provides forward-detection — a first line of defense against insider misuse and phishing.
Saves admins from drowning in raw logs with AI.
Emails haven’t changed in 40 years. With Beacon, we’re finally giving organizations the visibility, control, and intelligence they deserve.
Compatible with all email vendors.
Challenges we ran into
Implementing beacon inside the email body itself
Figuring out how to get accurate information through beacon for accurate tracking and management
implementing secure links and access control
multi vendor management
But we overcame all these challenges and implemented all of the above.
Tracks Applied (3)
Vultr Cloud Deployment Track
Vultr
Best Use of Gemini API
Major League Hacking
Open Innovation
Technologies used


