User Privacy & Security
Veil Protocol is built on three core principles: minimize exposure, encrypt by default, and keep users in control.
Local-first processing: Whenever possible, AI models run directly on the user’s device. Natural-language and workloads are executed locally, so raw data rarely leaves the handset.
End-to-end encryption: If data must travel to our Bittensor subnet, it is wrapped in modern cryptography. Intercepted packets reveal nothing but ciphertext.
Zero-knowledge validation: Select workflows use zero-knowledge proofs, allowing the network to verify facts without seeing the underlying data.
Strict data isolation: Each user’s workspace is enclaved; cross-account access is impossible, preventing accidental leaks or malicious ones.
Self-managed data flow: A built-in dashboard lets every user export, delete, or modify their stored data and change privacy settings at any time. Support tickets aren’t required.
Last updated