Security

Data custody stays with the Client. Offline verification is first class. No telemetry by default.

Design posture

Air gapped capable

No outbound internet is required for runtime.

Zero telemetry

No phone home behavior is required for operation.

Client owned keys

Private keys are injected at runtime. No private keys are stored by the system.

Verification purity

Binding root computation is designed as a pure function flow.

Download the posture document

Security posture PDF