Security & Trust
Intel TDX Confidential Compute · Live attestation
Checking enclave…
Pinging TEE attestation endpoint…
What happens to your data?
Standard AI API
  • Processed on shared servers
  • Provider can read your data
  • May be used for training
  • Logs retained for months
  • No cryptographic guarantee
VoltageGPU TDX
  • Runs inside hardware enclave
  • Memory encrypted — cloud provider cannot read it
  • Never used for training
  • Zero retention — deleted after response
  • ECDSA attestation report, verifiable on-chain
How Intel TDX works
1. Hardware isolation
Your data enters an Intel Trust Domain Extension (TDX) enclave — a physically isolated CPU region. Neither the cloud provider, nor VoltageGPU, nor any other process on the machine can read the memory.
2. Memory encryption
All memory inside the TDX enclave is encrypted using keys that exist only inside the CPU package. Encryption happens at silicon level, below the OS and hypervisor.
3. Remote attestation
Intel generates a signed ECDSA attestation report proving that the code running inside the enclave is exactly what we claim. Verifiable by any third party — cannot be faked.
4. Distributed TEE provider network
Inference runs across a network of independent operators, each executing inside their own Intel TDX enclave. No single operator can read your prompt — and no single operator can be coerced. The network consensus refuses any node that fails attestation, so a compromised host is invisible to your request.
Distributed TEE network
No single operator can be coerced

Inference is dispatched across a network of independent operators, each running inside their own Intel TDX enclave. The network refuses any node that fails attestation — a compromised host is invisible to your request, and no single operator ever holds the full picture.

Attestation
On every request
Single point of trust
None
Cold start
Zero
Retention
0 bytes
Compliance posture
GDPR
No data leaves enclave
HIPAA
Medical data stays private
SOX
Financial audit trail
CCPA
Zero retention = zero exposure
ISO 27001
Hardware-level controls
DORA (EU)
Resilient distributed enclaves
Verify the infrastructure yourself
Intel TDX is an open standard. Every enclave returns a signed attestation report you can verify against Intel's public root of trust.