The Simple Version
Before we get into architecture diagrams, here’s the core idea:- You type a prompt
- Your device encrypts it before sending anything over the network
- Our gateway receives the encrypted payload — it handles authentication and billing, but it cannot read your data
- The encrypted payload enters a sealed hardware environment (a Confidential Virtual Machine) where it gets decrypted, processed by the AI model, and the response is encrypted again
- The encrypted response travels back to your device, where it’s decrypted and displayed
Architecture Overview
The Components
Your Device — The PCCI SDK
The SDK runs on your side — your laptop, your server, your application, your browser. It’s the only place (besides the sealed enclave) where your data exists in readable form. What it does:- Encrypts everything before it leaves your device — using modern, quantum-resistant cryptography
- Holds your master encryption key — a key you generate, that never leaves your device
- Decrypts responses when they come back
PCCI API — The Blind Gateway
The proxy is the front door to the platform. It handles the operational side — checking your API key, enforcing rate limits, tracking usage for billing, routing requests. The critical point: it never sees your actual data. The proxy processes only encrypted payloads and metadata (like API keys and timestamps). It has no encryption keys and no way to decrypt what passes through it.| What the Proxy does | What the Proxy cannot do |
|---|---|
| Validate your API key and permissions | Read your prompts or responses |
| Enforce rate limits for your organization | Access any encryption keys |
| Route encrypted payloads to the right enclave | Log or inspect your data |
| Track usage for billing | Decrypt files you’ve uploaded |
PCCI Enclave — The Sealed Processing Environment
This is where your data is actually processed. The enclave runs inside a Trusted Execution Environment (TEE) — a sealed area of the processor with its own encrypted memory that the rest of the system cannot access. Think of it like a bank vault inside a building. The building owner has keys to every room — but the vault has its own lock that even the building owner cannot open. In this analogy, the “building” is the server, the “building owner” is whoever operates the server (us, or our infrastructure provider), and the “vault” is the TEE. Inside the enclave:- Your encrypted payload arrives
- The enclave decrypts it using a secure key exchange
- The AI model processes your request
- The response is encrypted before leaving
- All plaintext is wiped from memory
Model Router
A service that directs AI requests to the right model — all hosted within our confidential infrastructure. It manages which models are available, performs health checks, and selects the appropriate backend. It runs inside the same sealed environment as the enclave, so it never exposes your data outside the confidential compute boundary. No requests leave our infrastructure — all models run on our own hardware inside CVMs.Everything Runs in Sealed Environments
The enclave isn’t the only component inside the sealed environment. Every service that processes your data runs inside Confidential Virtual Machines (CVMs):| Service | What It Does | Runs in CVM? |
|---|---|---|
| Enclave | Decrypts, orchestrates, encrypts | Yes |
| Model Router | Routes to the right AI model | Yes |
| LLM Inference | Runs the AI model on your prompt (all models self-hosted) | Yes |
| Speech-to-Text (Deepgram, Whisper) | Transcribes your audio | Yes |
Where the Infrastructure Lives
PCCI runs on a hybrid infrastructure — a mix of hardware we own and capacity we rent:- Owned infrastructure is located in Switzerland, under Swiss data protection law
- Rented infrastructure is primarily in Europe, with some deployments in the United States
What Happens When You Send a Message
Here is the full lifecycle of a chat request: For streaming responses (like ChatGPT-style word-by-word output), each chunk is individually encrypted inside the enclave before being sent. The proxy forwards chunks without buffering or inspecting them.What You Don’t Need to Manage
The SDK handles all of this automatically. You don’t need to:- Understand or manage encryption algorithms
- Perform key exchanges manually
- Encrypt or decrypt anything in your application code
- Handle streaming decryption
For the full cryptographic details (algorithms, key types, protocols), see the Encryption reference. To understand the security guarantees and their limits, continue to Security Model.

