Overview
Technical documentation for the Privasys confidential computing platform.
Welcome to the Privasys technical documentation.
Privacy is a fundamental human right, and one of our core values. We believe that people and organisations should never have to choose between using cloud services and protecting their data. Privasys exists to make that choice unnecessary.
What is Privasys?
Privasys is an open-source confidential computing platform that builds trust through transparency. Modern processors embed secure hardware that can keep data encrypted in memory, even while it is being processed. Privasys leverages this hardware so that anyone connecting to our services can independently verify that their data is protected, without having to take our word for it.
Our Commitments
We designed Privasys around a set of core principles:
- Confidential by design. Data stays encrypted in secure hardware at all times: during transit, at rest, and while being processed. Not even the infrastructure operator can access it.
- Always verifiable. Every connection carries cryptographic evidence of what code is running and that it is running inside genuine secure hardware. Anyone can verify these guarantees independently.
- Open source. All infrastructure is published under AGPL-3.0. Inspect the code, audit the builds, reproduce from source. No black boxes.
- Standard protocols. We use TLS, HTTPS, and X.509, the same protocols the web already runs on. Attestation evidence rides inside standard certificates, invisible to clients that don't need it, fully inspectable by those that do.
- No vendor lock-in. Deploy on any compatible hardware, on any cloud, or on-premises. The platform is self-hosted and provider-agnostic.
The Trust Problem
Cloud computing requires handing over your data and code to a third party. Even with encryption at rest and in transit, there is a fundamental gap: data must be decrypted to be processed, and during that window the cloud provider, the host OS, the hypervisor, and any privileged attacker can observe it.
Confidential Computing closes this gap by running workloads inside hardware-enforced Trusted Execution Environments (TEEs). Technologies like Intel SGX, Intel TDX, and AMD SEV-SNP ensure that memory is encrypted, CPU state is isolated, and even a compromised hypervisor cannot peek inside.
But hardware isolation alone is insufficient. A critical question remains:
How does a remote client know it is actually talking to a genuine TEE running the expected code?
The traditional answer, remote attestation, requires custom client-side code, specialised SDKs, and an out-of-band attestation flow that is alien to the browser-based web.
Our Approach: Attested Connections
Privasys takes a different path. Instead of asking every client to speak a custom attestation protocol, we embed the attestation evidence directly into standard TLS certificates. This technique is called RA-TLS (Remote Attestation TLS), and it means:
- Zero client-side changes. Any TLS client, a browser,
curl, a mobile app, can connect without modification. HTTPS just works. - Composable with existing PKI. The certificate is signed by a private CA, chaining into your organisation's existing trust hierarchy.
- Cryptographic binding. The hardware quote's
ReportDatacontains a hash of the TLS public key, making the attestation inseparable from the TLS session. - Verifiable by anyone. A relying party extracts the quote from a standard X.509 extension and verifies it against the chip vendor's attestation infrastructure.
Our Products
Privasys is open-source infrastructure that you can deploy on your own hardware or cloud instances:
Enclave OS
A minimal operating system for hardware-protected environments, available in two editions:
Enclave OS Mini runs inside Intel SGX enclaves. Written entirely in Rust, it provides attested connections, an encrypted key-value store, sealed configuration, and a WASM runtime for running arbitrary business logic inside the enclave. The Trusted Computing Base is approximately 4 MB, the smallest attack surface available.
Enclave OS Virtual runs inside Confidential VMs (Intel TDX, AMD SEV-SNP). Standard Linux, standard tooling, with hardware-encrypted memory and full attestation. No code changes needed, your existing containers run as-is.
Enclave Vaults
Hardware-isolated secrets management that distributes trust across multiple enclave nodes using Shamir's secret sharing. Keys are generated and used exclusively inside secure hardware. Access is controlled through customisable policies, and every connection is verified through remote attestation. No single party, not even us, can access your secrets.
Enclave Agent
Confidential AI inference inside hardware-protected environments. Models run inside AMD SEV-SNP Confidential VMs with NVIDIA H100 Confidential Computing for GPU workloads. Supports private knowledge retrieval, secure agent-to-agent communication via Attested MCP, and hardware-attested connections to clients.
Privasys Platform
The deployment infrastructure that ties everything together: a developer platform for deploying WASM modules and containers on confidential infrastructure, verification libraries in multiple languages (Python, Go, Rust, TypeScript, C# .NET), and an attestation server that independently verifies hardware quotes. The Developer Platform is live, sign in with GitHub and deploy your first application in minutes.
Honest by Design
Traditional cloud requires you to trust the provider. Privasys replaces trust with verification:
- The enclave's identity (MRENCLAVE) proves exactly which code is running.
- The attested connection proves the TLS key was generated inside that enclave.
- The Config Merkle root proves exactly which CA, modules, and applications are loaded.
- All of this is embedded in a standard X.509 certificate that any client can inspect.
Do not trust. Verify.
Explore the Docs
Technology
What secure hardware is, how attestation works, and why it matters.
Enclave OS
Two deployment models, attestation, sealed storage, and container workloads.
Enclave Vaults
Hardware-isolated secrets management with distributed trust.
Enclave Agent
Confidential AI inference with hardware-protected data access.
Platform
Developer platform, verification libraries, and attestation server.