Privacy First

Privacy through mathematics, not promises

Your data never exists in readable form outside secure contexts

Privacy Architecture

Zero Data Retention

Your queries are never stored. Once processed, all data is immediately discarded from the network.

Trusted Execution Environments

Computations run in secure hardware enclaves (TEE) that prevent even node operators from accessing your data.

End-to-End Encryption

Data is encrypted on your device with RSA 2048-bit + AES-256 and remains encrypted throughout the entire inference process.

Zero-Knowledge Proofs

Cryptographic proofs verify computations were performed correctly without revealing the actual data or results.

Threshold Key Management

No single party controls decryption keys. Keys are split across multiple parties using threshold cryptography.

Verifiable Privacy

Don't trust, verify. All privacy guarantees are mathematically provable and auditable on-chain.

Privacy by Tier

Tier 1

Micro Nodes

Never see plaintext data - only verify zero-knowledge proofs

Tier 2

Edge Nodes

Process encrypted data with lightweight isolation

Tier 3

Full Nodes

Hardware TEE vaults - data decrypted only inside secure enclaves

Our Privacy Guarantees

  • Your prompts and queries are never logged or stored
  • Node operators cannot access your data in plaintext
  • Results are re-encrypted before leaving the secure context
  • Network traffic is encrypted and metadata is minimized
  • No personal information is required to use the network
  • Open-source code allows independent security audits

Technical Specifications

Encryption

  • • RSA 2048-bit key encryption
  • • AES-256 data encryption
  • • TLS 1.3 for network transport
  • • Secure key derivation (PBKDF2)

Zero-Knowledge Proofs

  • • Halo2 proof circuits
  • • Proof transcript verification
  • • On-chain proof validation
  • • Deterministic verification

Don't Trust. Verify.

All privacy guarantees are cryptographically verifiable and open-source

Review our implementation on GitHub or run your own independent security audit