User Privacy & Security

Veil Protocol is built on three core principles: minimize exposure, encrypt by default, and keep users in control.

  • Local-first processing: Whenever possible, AI models run directly on the user’s device. Natural-language and workloads are executed locally, so raw data rarely leaves the handset.

  • End-to-end encryption: If data must travel to our Bittensor subnet, it is wrapped in modern cryptography. Intercepted packets reveal nothing but ciphertext.

  • Zero-knowledge validation: Select workflows use zero-knowledge proofs, allowing the network to verify facts without seeing the underlying data.

  • Strict data isolation: Each user’s workspace is enclaved; cross-account access is impossible, preventing accidental leaks or malicious ones.

  • Self-managed data flow: A built-in dashboard lets every user export, delete, or modify their stored data and change privacy settings at any time. Support tickets aren’t required.

Last updated