Ghost security is engineered for verification: AI Evidence Log, AES-256, Ed25519, Secure Enclave keys, deterministic replay, fleet attestation — privacy through cryptographic proof, not policy text alone.
Security
Proofs — not promises. Local-first.
TLS 1.3 in transit · non-retention by contract · fully logged · opt-in only
When cloud escalation occurs (opt-in only), Ghost provides radical transparency about what happened. No hand-waving. No misleading claims. Here is exactly what Ghost guarantees:
The cloud provider's endpoint terminates TLS, meaning the provider does see plaintext during inference. This is a contractual guarantee (non-retention), not a cryptographic one. We state this honestly because enterprises deserve precision, not hand-waving.
TLS 1.3 for all cloud communication. Provider endpoint terminates TLS for inference processing.
Cloud provider contractually agrees to not retain context or output. Processing is ephemeral.
Every escalation logged in the AI Evidence Log: reason, encrypted payload size, provider, transit method, timestamps.
Cloud escalation never happens without explicit user or organizational policy authorization. Visible in Proof Drawer.
When Ghost adds confidential computing support, cloud inference will run inside hardware-attested Trusted Execution Environments (Intel SGX, AMD SEV, ARM CCA). Context processed in encrypted enclaves, never visible to the cloud provider in plaintext. TEE integrity attestation logged in the AI Evidence Log. This is a future phase — we don't claim it now.
Ghost generates signed compliance snapshots on demand: model fleet, active policies, knowledge graph hash, cloud escalation history, policy violation log. Exportable for auditors, regulators, or courts.
On-device processing, cryptographic erasure, full user control, proof of locality
No data collection or sale, user deletion with verification, zero third-party sharing
PHI locality proof, encryption key attestation, replayable clinical queries, audit export
Signed compliance snapshots, policy enforcement logs, deterministic replay, fleet attestation
Deterministic replay of financial analysis, policy enforcement proof, audit-grade evidence records
Zero-cloud attestation, fleet quarantine on drift, model registry verification, sovereign processing proof
Data residency attestation, zero cloud contact certification, hardware-backed device attestation
Found a security vulnerability? We take security seriously and respond within 48 hours.
security@ghostfied.com