// TRUST CENTER
We assume the operator is malicious, the cloud provider is compromised, and the network is hostile. We trust only the physics of the hardware.
AWS staff cannot dump enclave memory or decrypt traffic. The Nitro Hypervisor enforces strict isolation.
Even with root access to the EC2 host, keys cannot be extracted. The enclave has no interactive shell.
All traffic is end-to-end encrypted locally via vsock. No sensitive data touches the network card unencrypted.
"We do not rely on operational security or 'best practices.' We rely on cryptographic proofs generated by the hardware itself."
Immutable Record Keeping. Our logs are written to write-once storage if configured, satisfying broker-dealer requirements.
Transparency & Governance. Deterministic execution policies provide the audit trail required for High-Risk AI Systems.
Custody Requirements. Our self-custody architecture typically exempts you from CASP custody obligations (consult legal).