Privacy First
Privacy through mathematics, not promises
Your data never exists in readable form outside secure contexts
Privacy Architecture
Zero Data Retention
Your queries are never stored. Once processed, all data is immediately discarded from the network.
Trusted Execution Environments
Computations run in secure hardware enclaves (TEE) that prevent even node operators from accessing your data.
End-to-End Encryption
Data is encrypted on your device with RSA 2048-bit + AES-256 and remains encrypted throughout the entire inference process.
Zero-Knowledge Proofs
Cryptographic proofs verify computations were performed correctly without revealing the actual data or results.
Threshold Key Management
No single party controls decryption keys. Keys are split across multiple parties using threshold cryptography.
Verifiable Privacy
Don't trust, verify. All privacy guarantees are mathematically provable and auditable on-chain.
Privacy by Tier
Micro Nodes
Never see plaintext data - only verify zero-knowledge proofs
Edge Nodes
Process encrypted data with lightweight isolation
Full Nodes
Hardware TEE vaults - data decrypted only inside secure enclaves
Our Privacy Guarantees
- Your prompts and queries are never logged or stored
- Node operators cannot access your data in plaintext
- Results are re-encrypted before leaving the secure context
- Network traffic is encrypted and metadata is minimized
- No personal information is required to use the network
- Open-source code allows independent security audits
Technical Specifications
Encryption
- • RSA 2048-bit key encryption
- • AES-256 data encryption
- • TLS 1.3 for network transport
- • Secure key derivation (PBKDF2)
Zero-Knowledge Proofs
- • Halo2 proof circuits
- • Proof transcript verification
- • On-chain proof validation
- • Deterministic verification
Don't Trust. Verify.
All privacy guarantees are cryptographically verifiable and open-source
Review our implementation on GitHub or run your own independent security audit