Built Different
Weโre confident in our guarantees about data privacy & security, targetability, and protection from adversarial operators.
Weโre confident in our guarantees about data privacy & security, targetability, and protection from adversarial operators.
IETF standard that offers a mechanism to make HTTP requests to a server without revealing to the server the true requester
Digitally sign something without seeing the content and without linking the later revealed content to the earlier signature
Mechanism for a client (โrelying partyโ) to ask a server (โattesterโ) to prove its identity and what it is running
Secure system that keeps sensitive data hidden and inaccessible from the main operating system
Tamper-proof append-only public record of software packages available for review
Process to ensure booted and running software is trusted + a stripped down version of linux that is more difficult to hack or modify
Virtual machine initialized inside a hardware-based trusted execution environment (TEE) so that the host cannot see inside the virtual machine
Verify that the running binary is the same as what the compiler generates from the source code itself
User data is used exclusively to fulfill the userโs request, not available to anyone, and must not be retained, including via logging or for debugging.
Code and infrastructure -- not convention or policy -- is designed to make certain things impossible and to ensure the system behaves correctly
An attacker cannot compromise data that belongs to specific users without attempting a broad compromise.
Our staff cannot bypass privacy guarantees for any reason.
Security researchers must be able to verify the security and privacy guarantees and must be able to verify that the software running in production is the same as the software they inspected.
Finally, AI is available for private, secure,
and compliant use cases