CoRF vs Jamming: Why Protocol Matters
Sentrycs cyber-over-RF approach compared to traditional RF disruption
The Fundamental Problem
Most counter-drone systems jam RF frequencies. This works in military zones but is illegal in civilian airspace in most jurisdictions. Sentrycs CoRF takes a fundamentally different approach.
How CoRF Works
CoRF (Cyber-over-RF) attacks the communication protocol between the drone and its operator — not the RF spectrum itself. It identifies the specific protocol, injects commands, and takes control of the drone.
The Legal Advantage
Because CoRF doesn't emit broadband RF energy, it doesn't trigger jamming regulations. This is the single most important architectural decision in the OAS C-UAS stack.
CoRF + Iron Drone: The Complete Stack
CoRF handles drones with active RF links (soft-kill). Iron Drone Raider handles autonomous drones with no RF link (hard-kill via net capture). Together they cover the full threat spectrum.