Skip to main content
This documentation is a living document and is subject to frequent changes to reflect the current state of the architecture.
Key takeaway: PCCI ships today with full end-to-end encryption, CPU + GPU attestation, and a complete AI capability set (chat, audio, vision, documents, search). The main gap at launch is image reproducibility — the ability for you to rebuild our enclave image from source and verify it matches production. This is our top roadmap priority. Everything else listed below is available now.

What Ships Today

Encryption & Privacy

Everything below is production-ready and available now.
FeatureWhat It Means for You
End-to-end encryption (post-quantum)Your data is encrypted on your device and only decrypted inside the sealed enclave. Protected against both current and future quantum threats.
Client-side key sovereigntyYou generate and hold the master key. We never have it and cannot decrypt your data.

AI Capabilities

All standard AI features, fully encrypted:
CapabilityDetails
Chat completionsOpenAI-compatible, streaming, tool calling, multi-step reasoning
Audio transcriptionWhisper and Deepgram models
Audio translationAudio to English

Attestation

Hardware-backed proof that the right code is running on genuine hardware:
FeatureWhat It Means for You
AMD SEV-SNP CPU attestationVerify the enclave is running the expected code on genuine AMD hardware
Intel TDX CPU attestationSame verification for Intel-based deployments
NVIDIA GPU attestationVerify GPU confidential computing is active on genuine NVIDIA Hopper/Blackwell hardware
Combined CPU + GPU attestationVerify the entire processing pipeline, not just one component
Multi-GPU attestation & load balancingAttest and distribute inference across multiple GPUs with per-GPU verification
Rust/WASM verification stackMemory-safe verification code you can run in a browser — no server trust needed

Platform & SDK

FeatureWhat It Means for You
TypeScript SDKFull-featured client with automatic encryption — works like the OpenAI SDK
Local proxy serverUse PCCI from any language (Python, Go, Java, etc.) with zero code changes
Organizations & teamsMulti-org support with role-based permissions
Scoped API keysFine-grained permissions with IP restrictions
Rate limiting (4-tier)Fair usage across Free, Tier 1, Tier 2, and Tier 3
Usage-based billingStripe integration with tier progression
IdempotencySafe retries with 24-hour key validity

What’s Not Available at Launch

We believe in being upfront about gaps. These features are in progress but not ready on day one.

Image Reproducibility

Not available at launch. This is our highest-priority roadmap item.
What it is: The ability for anyone to rebuild the exact enclave image from our published source code and verify that the resulting binary matches what’s running in production — byte for byte. Why it matters: Today, attestation proves that the enclave is running a specific image (the fingerprint matches a published value). But how do you know that published fingerprint corresponds to the open-source code? You’re trusting our build process. Reproducible builds close this gap — you build the image yourself, compare the fingerprint, and verify the match independently. Where we are today:
  • The build infrastructure is in place (Packer-based, pinned base images, pinned driver versions)
  • The build pipeline produces consistent images
  • You can verify attestation fingerprints against our published values
  • You cannot yet independently reproduce the exact binary, because we haven’t eliminated all sources of non-determinism (timestamps, file ordering, package manager variance)
What’s coming:
  • Deterministic build tooling that eliminates non-determinism
  • Published step-by-step instructions for independent reproduction
  • Automated hash comparison tooling
  • CI/CD integration that publishes reproducibility proofs alongside every release

Attestation Hardening

Incremental improvements to the attestation system, shipping continuously:
ImprovementWhy It Matters
Certificate Revocation List (CRL) checkingAutomatically detect if attestation signing keys have been revoked
Embedded root CAsShip manufacturer root certificates in the verification libraries, removing runtime dependencies
Stricter TCB matchingTighter validation of platform firmware and security versions
Automated measurement verificationCompare attestation fingerprints against published known-good values automatically with each release

Roadmap

Ordered by priority. We ship when things are ready, not on arbitrary dates.

Next Priority

Reproducible Enclave Images

Deterministic builds with published instructions for independent verification. This completes the trust chain from source code → build → running enclave. Our most important gap to close.

Attestation Hardening

CRL checks, embedded root CAs, stricter TCB matching, and automated measurement verification. Incremental improvements shipping continuously.

Medium-Term

Additional Self-Hosted Models

More model families hosted within our confidential infrastructure.

Enhanced Document Search

Improved embedding models, smarter document chunking, and cross-document search.

Longer-Term

Native SDKs for More Languages

Python, Go, and Rust SDKs with built-in encryption — beyond the current local proxy approach.

Verification Center

A visual interface for inspecting attestation reports, viewing measurement history, and monitoring enclave health — making verification accessible to non-specialists.

Enclave-to-Enclave Chaining

Multi-hop confidential computing where enclaves attest to each other, enabling complex confidential workflows across services.

The Trust Journey

PCCI’s trust model strengthens progressively. Each milestone narrows what you need to take on faith: Today — Attestation proves that the enclave is running a specific, fingerprinted image on genuine hardware. You can verify the hardware signatures and confirm freshness. The gap: you trust our published fingerprints correspond to the source code. Next — Reproducible builds let you build the image yourself and compare fingerprints. This closes the trust gap between source code and running enclave. At this point, you trust only the hardware manufacturers and the laws of mathematics. Then — A verification center makes continuous monitoring accessible to everyone — visual dashboards, alerts on fingerprint changes, transparencies summaries and historical audit trails. Security verification becomes something anyone in your organization can check, not just your security team.
This page reflects the current state of the platform. We update it as things change. For questions about specific features or timelines, reach out at support@premai.io.