Loading...
private.me Docs
Get Full Control
ON-PREMISES DEPLOYMENT

Full Control: Deploy anywhere. Pay everywhere.

Run vendor code on your infrastructure with mathematical billing enforcement. Data sovereignty with cryptographic payment control. No tracking, no telemetry, no trust required.

Building blocks: crypto + xpass + xghost
Air-gap capable
Information-theoretic security

Deploy Proprietary Algorithms On-Premises

Start with 3-month free trial. No credit card required.

Start Free Trial $5/mo Basic • $10/mo Middle • $15/mo Enterprise
EXECUTIVE SUMMARY

The impossible made possible

Full Control solves the fundamental tension between customer data sovereignty and vendor payment control through cryptographic enforcement.

Traditional software licensing relies on honor systems or surveillance. License keys can be copied. Virtual machines can be cloned. Air-gapped systems cannot be monitored. The vendor's only options are to trust the customer or to watch them.

Full Control replaces both with mathematics. Your proprietary algorithm is split using XorIDA threshold sharing. Share 1 deploys to customer infrastructure. Share 2 remains on your server, delivered only when payment is current. Both shares are required for execution. Neither share is useful alone.

CORE INSIGHT
The split IS the enforcement. No DRM to crack. No obfuscation to reverse-engineer. No telemetry to disable. Payment lapsed means Share 2 is denied, and the code stops working. Information-theoretically guaranteed.
~75µs
Reconstruction overhead
~50ms
Share delivery
24h
Default epoch rotation
0 bytes
Usage data sent
DEVELOPER EXPERIENCE

Five lines to deploy

Wrap your algorithm in a threshold-protected container. The rest is automatic.

Vendor: Split your algorithm
import { createFullControl } from '@private.me/full-control';

// Your proprietary algorithm
function proprietaryAlgorithm(input: Data): Result {
  // Trade secret logic here
  return computeResult(input);
}

// Wrap with cryptographic billing
const protected = await createFullControl({
  algorithm: proprietaryAlgorithm,
  customerDID: 'did:key:z6Mk...',
  scope: 'trading-algo-v2'
});

// Share 1 → customer infrastructure (via Docker image)
// Share 2 → your billing server
await protected.deploy();
Customer: Run on your infrastructure
import { FullControlClient } from '@private.me/full-control';

// Initialize with Share 1 (from vendor Docker image)
const client = new FullControlClient({
  shareStorePath: '/opt/vendor/share1.bin',
  vendorEndpoint: 'https://vendor.example/api'
});

// Run the algorithm (Share 2 fetched automatically)
const result = await client.execute(inputData);

// Payment current? → Share 2 delivered → result computed
// Payment lapsed? → Share 2 denied → execution fails

No usage tracking. The vendor server only checks: "Is payment current for this customer?" Binary decision. Share 2 is delivered or denied. The algorithm never sends usage data, inputs, or outputs.

FAST ONBOARDING

Zero to production in minutes

Three speed tiers for every deployment scenario. Choose based on your urgency and infrastructure complexity.

Zero-Click (15 seconds)

One function call. No configuration files. No invite codes. No manual setup. Perfect for prototyping, demos, and integration tests.

Split algorithm for deployment
import { splitForDeployment } from '@private.me/full-control';

const result = await splitForDeployment(
  'export function predict(x) { return x * 2; }', // algorithm source
  ['predict'], // exported functions
  'did:key:z6MkVendor...', // vendor DID
  'did:key:z6MkCustomer...', // customer DID
  'ml-inference', // scope
  'https://vendor.example.com', // vendor server
  'basic' // deployment tier
);

const { customerArtifact, vendorArtifact, connectionId } = result.value;

Connection ID auto-generated. No invite flow. No manual registration. The split operation creates a unique connection identifier and returns both artifacts ready for deployment.

CLI (90 seconds)

Command-line interface for teams that prefer scripts over code. Single command splits algorithm, generates artifacts, and outputs deployment instructions.

CLI deployment workflow
# Split algorithm
full-control split \
  --source ./algorithm.js \
  --exports predict,train \
  --vendor did:key:z6MkVendor... \
  --customer did:key:z6MkCustomer... \
  --scope ml-inference \
  --server https://vendor.example.com

# Output: customer-artifact.json, vendor-artifact.json, connection ID

# Customer: reconstruct and execute
full-control run \
  --artifact customer-artifact.json \
  --function predict \
  --args '[{"x": 42}]'

Scriptable and reproducible. CI/CD pipelines can automate deployment. Version control tracks artifact configurations. No interactive prompts required.

Deploy Button (10 minutes)

Pre-built templates for instant infrastructure deployment. Click one button, fill in environment variables, and your vendor server is live with Stripe billing integration.

Platform Template Includes Deploy Time
Vercel Deploy to Vercel Vendor server, Stripe integration, artifact storage ~5 min
Docker docker run -p 3000:3000 private.me/full-control-vendor Complete vendor server, SQLite storage, API endpoints ~2 min
AWS Lambda Deploy to AWS Serverless vendor API, DynamoDB storage, CloudWatch logs ~8 min
GitHub Codespaces Open in Codespaces Development environment, example algorithms, test suite ~3 min

Production-ready templates. Each includes database schema, authentication middleware, rate limiting, error handling, and deployment scripts for customer artifacts.

Migration path

Start with Zero-Click for prototyping. Migrate to explicit configuration when you need custom billing logic, multi-region deployments, or compliance requirements.

Production configuration with Stripe billing
const config: FullControlConfig = {
  vendorDid: process.env.VENDOR_DID,
  vendorServer: process.env.VENDOR_SERVER,
  checkPayment: async (connectionId) => {
    const subscription = await stripe.subscriptions.retrieve(connectionId);
    return ok({
      connectionId,
      paymentCurrent: subscription.status === 'active',
      epoch: { start: Date.now(), end: Date.now() + 86400000 },
      shares: []
    });
  },
  storeVendorShare: async (artifact) => {
    await db.vendorShares.insert(artifact);
    return ok(undefined);
  },
  retrieveVendorShare: async (connectionId) => {
    const artifact = await db.vendorShares.findOne({ connectionId });
    return artifact ? ok(artifact) : err('CONNECTION_NOT_FOUND');
  }
};

Zero breaking changes. The quick start API signature is identical to production. You add configuration, not rewrite code.

THE PROBLEM

Traditional licensing is broken

Every existing software licensing mechanism fails when customers control the infrastructure.

License Keys

Keys are strings. Strings can be copied, shared, or posted online. A single license can activate unlimited instances. Detection requires the vendor to monitor usage, which customers refuse for proprietary systems.

Online Activation

Air-gapped systems cannot phone home. Government classified networks, industrial OT/ICS, healthcare HIPAA zones, financial trading floors all prohibit external connectivity. "Must connect to activate" eliminates your largest enterprise buyers.

Hardware Dongles

Physical tokens can be reverse-engineered. Virtualized environments cannot attach USB devices. Cloud infrastructure has no concept of hardware peripherals. Dongle emulators exist for every major vendor.

Code Obfuscation

Obfuscation delays reverse-engineering but cannot prevent it. Given enough time and motivation, every obfuscated binary can be decompiled. High-value algorithms (trading, defense, pharma) justify unlimited reverse-engineering budgets.

THE CORE DILEMMA
Customers want data sovereignty. You want payment control. Traditional licensing forces you to choose. You can trust the customer (and lose revenue to piracy), or you can surveil them (and lose the sale to competitors who respect sovereignty).
Mechanism Air-Gap Capable No Surveillance Cryptographically Enforced
License Keys Honor system
Online Activation Requires internet Phoning home Server-side policy
Hardware Dongles Emulatable
Code Obfuscation Reversible
Full Control Information-theoretic
THE SOLUTION

Cryptographic billing enforcement

XorIDA threshold sharing makes payment control a mathematical property, not a policy.

How It Works

Your proprietary algorithm is split into two shares using XorIDA 2-of-2 threshold sharing. Each share is information-theoretically useless alone. An attacker with infinite computing power, analyzing Share 1 forever, learns nothing about your algorithm.

Two-share model
// Vendor splits algorithm into 2 shares
const { share1, share2 } = await split(algorithm, { k: 2, n: 2 });

// Share 1: Deployed to customer infrastructure
//   - Customer has full control
//   - Can be inspected, audited, reverse-engineered
//   - Reveals NOTHING about the algorithm

// Share 2: Held on vendor billing server
//   - Delivered only when payment is current
//   - 24-hour default epoch (must re-fetch daily)
//   - HMAC-authenticated, replay-protected

// Both shares required for execution
const result = reconstruct([share1, share2]).execute(input);

Billing Flow

Every 24 hours (configurable), the customer's infrastructure requests Share 2 from your billing server. Your server performs a single check: "Is payment current?"

  • Payment current: Share 2 delivered. Algorithm executes normally.
  • Payment lapsed: Share 2 denied. Reconstruction fails. Code stops working.

No usage tracking. No telemetry. No surveillance. The vendor never sees inputs, outputs, or execution patterns. The only data transmitted is the payment status check and Share 2 delivery.

CRYPTOGRAPHIC GUARANTEE
The enforcement is mathematical. Share 1 alone cannot execute the algorithm, no matter how skilled the reverse-engineer or how powerful their hardware. This is an information-theoretic guarantee, not a computational assumption. Even quantum computers cannot break it.

Air-Gap Deployment

For air-gapped environments (SIPRNET, industrial OT, classified systems), Share 2 can be delivered via one-way data diode, sneakernet, or manual import. The epoch period extends to match operational security requirements (weekly, monthly).

WHY XORIDA

The unique value proposition

XorIDA offers capabilities that no other cryptographic approach can match: information-theoretic security, zero key management, and true vendor control without data visibility.

Information-Theoretic Security vs. Computational Security

Most encryption relies on computational security — the assumption that attackers don't have enough computing power to break it. AES-256, RSA, and elliptic curve cryptography are all computationally secure. They're safe today, but may become vulnerable if quantum computers advance or if mathematical breakthroughs occur.

XorIDA provides information-theoretic security — a mathematical guarantee that Share 1 alone reveals nothing about the original algorithm, regardless of computing power. An attacker with infinite resources, analyzing Share 1 for eternity, learns zero bits of information. This is the same security level as a one-time pad.

MATHEMATICAL GUARANTEE
Share 1 is uniformly random over the entire space of possible algorithms. Every possible algorithm is equally likely given Share 1 alone. This is provable, not an assumption. It holds even against quantum computers or adversaries with unbounded computational power.

No Key Management Overhead

Traditional encryption requires key generation, distribution, rotation, and revocation. Keys must be stored securely. If a key is compromised, all encrypted data is at risk. Organizations spend millions on key management infrastructure (HSMs, KMS, key escrow).

XorIDA threshold sharing has no keys. The shares themselves are the only secret material. There's nothing to rotate, nothing to revoke, nothing to store in an HSM. When payment lapses, Share 2 is simply not delivered. When payment resumes, Share 2 is delivered again. No key ceremony, no emergency key rotation, no key compromise recovery procedure.

Vendor Control Without Data Visibility

SaaS gives vendors control (they can turn off service for non-payment) but requires sending customer data to vendor infrastructure. On-premises deployment gives customers data sovereignty but removes vendor billing control.

Full Control via XorIDA is the only approach that provides both:

  • Vendor control: Algorithm stops working if payment lapses (mathematically enforced).
  • Data sovereignty: Customer data never leaves their infrastructure. Vendor never sees inputs, outputs, or execution patterns.

No other technology offers this combination. Homomorphic encryption allows computation on encrypted data but is 1,000-10,000x slower. Trusted execution environments (TEEs) like SGX provide secure enclaves but have been compromised multiple times via side-channel attacks.

Speed Comparison

XorIDA is not just more secure — it's faster than alternatives.

Approach 10KB Algorithm 100KB Algorithm 1MB Algorithm
XorIDA (2-of-2) ~75µs ~150µs ~1.2ms
Shamir's Secret Sharing ~45ms ~180ms ~2,100ms
AES-256-GCM ~120µs ~240µs ~2.4ms
Homomorphic Encryption ~5 seconds ~50 seconds N/A (impractical)

XorIDA is 500-2,000x faster than Shamir's Secret Sharing for the same security level. It matches AES-256-GCM speed for small payloads and is only 2x slower for large payloads — while providing information-theoretic security instead of computational security.

Quantum-Proof Guarantee

Post-quantum cryptography (PQC) algorithms like ML-KEM and ML-DSA are believed to resist quantum attacks, but they rely on mathematical assumptions (lattice hardness, LWE). If those assumptions are broken, PQC fails.

XorIDA's security is not based on assumptions. It's provably secure against all adversaries, including quantum computers, because Share 1 alone contains zero information about the original algorithm. No amount of quantum computing power changes this mathematical fact.

FUTURE-PROOF
XorIDA will remain secure in 2030, 2050, and 2100. Quantum computing advances, mathematical breakthroughs, and new attack techniques are irrelevant to information-theoretic security. This is the only billing enforcement mechanism that will never require a security upgrade.
COMPARISON

Technology landscape

How XorIDA compares to other approaches for secure on-premises deployment with vendor control.

Technology Info-Theoretic Speed No Keys Data Sovereignty Quantum-Proof
XorIDA Sub-ms Provable
Shamir's Secret Sharing 500-2000x slower Provable
AES-256 Computational ~µs Requires keys Vulnerable to quantum
Homomorphic Encryption Computational 1000-10000x slower Requires keys Assumption-based
TEE (SGX, TrustZone) Hardware-based Native speed Data visible in enclave Side-channel vulnerable
MPC (Multi-Party Computation) Computational 10-100x slower Requires keys Assumption-based

Why Not Shamir's?

Shamir's Secret Sharing provides the same information-theoretic security as XorIDA and supports the same K-of-N threshold schemes. So why choose XorIDA?

Performance. Shamir's operates over finite fields GF(2^8) or GF(2^256) and requires polynomial interpolation (Lagrange basis) for reconstruction. XorIDA operates over GF(2) (binary field) and uses simple XOR for reconstruction. For a 1MB algorithm:

  • XorIDA: ~1.2ms reconstruction time.
  • Shamir's: ~2,100ms reconstruction time (1,750x slower).

For real-time billing enforcement, this matters. XorIDA allows sub-millisecond algorithm reconstruction, enabling execution latency that matches native code. Shamir's multi-second overhead is unacceptable for production workloads.

Why Not AES-256?

AES-256 is fast and widely supported. Why not encrypt the algorithm with AES and gate key delivery based on payment?

Key compromise. If the AES key is ever leaked (insider threat, memory dump, side-channel attack), the vendor loses all control. The customer can decrypt the algorithm forever. With XorIDA, there is no key to leak. Share 1 is useless alone, and Share 2 is ephemeral (expires every 24 hours by default).

Quantum vulnerability. AES-256 is vulnerable to Grover's algorithm, which reduces effective key strength to 128 bits. XorIDA is provably quantum-proof — no quantum algorithm can extract information from Share 1 alone.

Why Not Homomorphic Encryption?

Homomorphic encryption (HE) allows computation on encrypted data without decryption. Why not encrypt the algorithm with HE and let customers execute it without ever seeing plaintext?

Performance catastrophe. Even the fastest HE schemes (BFV, CKKS) are 1,000-10,000x slower than native execution. A 100ms algorithm call becomes 100+ seconds. This is unacceptable for production use.

No vendor control. Once the customer has the HE-encrypted algorithm, they own it forever. There's no billing enforcement mechanism. The vendor cannot revoke access.

Why Not TEEs (Trusted Execution Environments)?

Intel SGX, ARM TrustZone, and AMD SEV provide hardware-isolated secure enclaves. Why not run the algorithm inside a TEE and prevent customers from extracting it?

Side-channel attacks. SGX has been compromised via Spectre, Foreshadow, Plundervault, LVI, and other side-channel attacks. TEEs provide isolation against software attacks, but not against hardware-level attackers.

Vendor lock-in. TEEs are hardware-specific. Intel SGX doesn't work on AMD processors. ARM TrustZone doesn't work on Intel. Customers are locked into specific CPU vendors.

No data sovereignty. The algorithm executes inside the enclave, but the customer's data must enter the enclave to be processed. The vendor can potentially access this data (or at least metadata about execution patterns).

Why Not MPC (Multi-Party Computation)?

MPC allows multiple parties to jointly compute a function without revealing their inputs. Why not use MPC to execute the algorithm across vendor and customer infrastructure?

Complexity. MPC requires continuous network communication during computation. Every operation requires multiple rounds of interaction between parties. This adds 10-100x latency overhead.

No unilateral vendor control. MPC requires cooperation from both parties. If the customer refuses to participate, the vendor cannot enforce payment. With XorIDA, the vendor unilaterally controls Share 2 delivery.

VERDICT
XorIDA is the only approach that combines information-theoretic security, sub-millisecond performance, zero key management, true data sovereignty, and unilateral vendor billing control. No other technology offers this combination.
USE CASES

Markets that demand sovereignty

Full Control targets industries where data cannot leave customer infrastructure, but vendors still require payment enforcement.

🏥
Healthcare AI
On-Premises ML Models
Deploy diagnostic AI on hospital infrastructure. Patient data never leaves HIPAA-compliant zones. Vendors bill per facility without seeing medical records.
HIPAA-compliant
📈
Financial Trading
Proprietary Algorithms
License trading algorithms to hedge funds. Algorithms run on fund infrastructure. No trade data, positions, or strategies leave the network.
Zero data exposure
🛡️
Defense / Classified
Air-Gapped Systems
Deploy to SIPRNET, JWICS, or other classified networks. Share 2 delivered via physical media or data diode. No external connectivity required.
ITAR-compliant
🏭
Industrial OT/ICS
Process Optimization
License optimization algorithms to manufacturers. Code runs on factory floor. Production data stays within operational technology networks.
Air-gap capable
🏛️
Government SaaS
FedRAMP Deployment
Sell to federal agencies with FedRAMP Moderate requirements. Agencies deploy on their infrastructure. Vendor retains billing control.
FedRAMP-ready
🧬
Pharmaceutical R&D
Compound Discovery
License discovery models to pharma companies. Models run on company infrastructure. Proprietary compound data never leaves research network.
IP-protected

Industry Compliance Mapping

Industry Regulation Full Control Benefit
Healthcare HIPAA, HITECH Patient data never leaves customer infrastructure
Financial SEC 17a-4, FINRA, SOX Trade data, positions, strategies remain private
Government FedRAMP, FISMA, ITAR Air-gap capable, no phoning home
Defense CMMC, DFARS, NIST 800-171 Classified network deployment without external dependency
EU Operations GDPR, Schrems II Data sovereignty guaranteed, no US vendor access
ARCHITECTURE

System design

Full Control orchestrates three building blocks: crypto (XorIDA), xpass (billing), and xghost (ephemeral execution).

Building Block Composition

1. Crypto: XorIDA Threshold Sharing

Splits the proprietary algorithm into K-of-N shares. Default 2-of-2 for maximum security. Each share is information-theoretically useless alone. Reconstruction requires both shares and HMAC verification.

2. Xpass: Billing Enforcement

Manages the connection between customer DID and vendor billing server. Tracks payment status. Generates connection IDs via SHA-256(didA + didB + scope). Gates Share 2 delivery based on billing state.

3. Xghost: Ephemeral Execution

Ensures shares are never persisted to disk after use. Reconstructed algorithm executes in memory only. Shares are purged after each execution or epoch expiry. Heartbeat mechanism enforces epoch rotation.

Architecture flow
// 1. Vendor splits algorithm (offline, one-time)
const { share1, share2 } = await crypto.split(algorithm, { k: 2, n: 2 });

// 2. Share 1 → Docker image, deployed to customer
// 3. Share 2 → Vendor billing server

// 4. Customer runtime requests Share 2
const connectionId = SHA256(customerDID + vendorDID + scope);
const paymentOK = await xpass.checkPayment(connectionId);

if (paymentOK) {
  // 5. Share 2 delivered via HTTPS
  const share2Encrypted = await vendor.fetchShare2(connectionId);

  // 6. Xghost reconstructs algorithm in memory
  const algorithm = await xghost.reconstruct([share1, share2Encrypted]);

  // 7. Execute and purge
  const result = await algorithm.execute(input);
  await xghost.purge(); // Algorithm erased from memory
} else {
  throw new PaymentRequiredError('Payment lapsed');
}

Epoch Rotation

Share 2 includes an expiry timestamp. Default 24 hours. After expiry, the customer runtime must re-fetch Share 2. This enforces continuous payment verification without requiring real-time connectivity.

For air-gapped systems, epoch period extends to match operational requirements (weekly, monthly). Share 2 is delivered via physical media, one-way data diode, or manual import.

SECURITY PROPERTY
Even if a customer extracts Share 2 and attempts to cache it indefinitely, the HMAC includes a nonce and timestamp. Replayed Share 2 will be rejected. Expired Share 2 cannot reconstruct the algorithm. The vendor controls the validity window cryptographically.
DEPLOYMENT

Deployment models

Full Control supports four deployment tiers: Basic (HTTPS), Software Hardened (obfuscated), Air-Gap (manual), and Plus (MPC-verified).

Software Hardened
Enhanced
Code obfuscation before splitting
Anti-debugging runtime checks
Memory dump detection
~97% protection (software-only)
+5-15ms obfuscation overhead
Air-Gap
Classified
One-way data diode delivery
Manual or automated import
Weekly or monthly epoch
Physical media fallback
SIPRNET / JWICS compatible
Plus (MPC)
Enterprise
3-party multiparty computation
Reconstruction verification
Tamper-evident execution
Audit trail via xfuse
~200ms MPC overhead

Basic Tier: Docker + HTTPS

The vendor packages Share 1 into a Docker image. Customer pulls and deploys the image on their infrastructure. At runtime, the container fetches Share 2 via HTTPS from the vendor billing server.

Dockerfile example
FROM node:20-alpine

# Copy Share 1 into image
COPY share1.bin /opt/vendor/share1.bin

# Install Full Control client
RUN npm install @private.me/full-control

# Runtime fetches Share 2 automatically
CMD ["node", "runtime.js"]

Software Hardened Tier: Obfuscation + Anti-Debugging

For customers who want additional protection against reverse engineering beyond the mathematical guarantees of XorIDA, the Software Hardened tier adds multiple layers of code obfuscation and runtime protection.

Pre-Split Obfuscation: Before XorIDA splitting, the algorithm undergoes control flow obfuscation (control flow flattening, opaque predicates), string encryption, and dead code injection. This increases the difficulty of static analysis by ~10-20x.

Runtime Anti-Debugging: The reconstructed algorithm includes anti-debugging checks (debugger detection, timing checks, integrity verification) that trigger if an attacker attempts to step through execution. Failed checks cause immediate termination without revealing algorithm logic.

Memory Dump Detection: Runtime monitors for process memory inspection (ptrace, ReadProcessMemory, /proc/mem access). If detected, the algorithm purges itself from memory and terminates.

HONEST LIMITATION
Software-only protection is never 100% effective. A skilled attacker with physical access, hardware debugging tools, and unlimited time can eventually reverse-engineer obfuscated code. The Software Hardened tier provides ~97% protection by raising the cost and time required to break protection from hours to weeks or months. It is NOT a replacement for the information-theoretic guarantee of XorIDA — Share 1 alone remains mathematically useless. Obfuscation is a defense-in-depth layer.

Performance Impact

Obfuscation adds overhead to both splitting and reconstruction:

  • Splitting: +200-500ms (one-time vendor operation).
  • Reconstruction: +5-15ms (per algorithm execution).
  • Execution: +2-8% slowdown (due to control flow obfuscation).

For most workloads, this overhead is negligible. The obfuscation cost is amortized across thousands or millions of executions.

Air-Gap Tier: Manual Import

For classified or air-gapped networks, Share 2 is delivered via physical media (USB drive, CD-ROM) or one-way data diode. The customer's security team imports Share 2 manually into the runtime environment.

Epoch period is extended to match operational security requirements (weekly, monthly). Share 2 includes cryptographic attestation (HMAC, timestamp, nonce) to prevent tampering or replay.

Plus Tier: MPC-Verified Execution

Enterprises requiring audit trails use 3-party multiparty computation. The vendor, customer, and a neutral third party (auditor, compliance officer) each hold a share. Reconstruction requires 2-of-3 agreement.

Every execution is logged to an immutable audit trail via xfuse. The auditor can verify that Share 2 was delivered only when payment was current, and that the algorithm executed without tampering.

INTEGRATION

Integration guide

Integrate Full Control into your existing codebase in under 30 minutes.

Vendor Setup

1. Install the package
npm install @private.me/full-control
2. Split your algorithm
import { createFullControl } from '@private.me/full-control';

const protected = await createFullControl({
  algorithm: yourProprietaryFunction,
  customerDID: 'did:key:z6Mk...',
  scope: 'product-name-v1',
  epochDuration: 86400 // 24 hours in seconds
});

// Writes share1.bin to disk, stores share2.bin in billing DB
await protected.split();
3. Package Share 1 into Docker image
COPY share1.bin /opt/vendor/share1.bin
ENV VENDOR_ENDPOINT=https://billing.vendor.example/api
4. Deploy billing server endpoint
import { createBillingServer } from '@private.me/full-control/server';

const server = createBillingServer({
  port: 3000,
  checkPayment: async (connectionId) => {
    // Your billing logic here
    const account = await db.accounts.findOne({ connectionId });
    return account?.paymentCurrent === true;
  }
});

server.listen();

Customer Setup

1. Pull vendor Docker image
docker pull vendor.example/product:latest
2. Configure runtime environment
docker run -d \
  -e VENDOR_ENDPOINT=https://billing.vendor.example/api \
  -e CUSTOMER_DID=did:key:z6Mk... \
  -v /data:/opt/vendor/data \
  vendor.example/product:latest
3. Run the algorithm
// Inside container runtime
import { FullControlClient } from '@private.me/full-control';

const client = new FullControlClient({
  shareStorePath: '/opt/vendor/share1.bin',
  vendorEndpoint: process.env.VENDOR_ENDPOINT
});

// Automatically fetches Share 2, reconstructs, executes
const result = await client.execute(inputData);

API Surface

createFullControl(options): Promise<FullControl>
Creates a threshold-protected wrapper for your algorithm. Splits into K-of-N shares. Returns handle for deployment.
FullControlClient.execute(input): Promise<Result>
Executes the protected algorithm. Fetches Share 2 if needed, reconstructs in memory, runs algorithm, purges shares. Returns result or throws PaymentRequiredError.
createBillingServer(config): Server
Deploys vendor billing server. Handles Share 2 requests, payment verification, HMAC signing, epoch management.
SECURITY

Security model

Full Control provides information-theoretic confidentiality and cryptographic billing enforcement.

Threat Model

Attacker Goals

  • Reverse-engineer the algorithm from Share 1 alone
  • Execute the algorithm without payment by bypassing Share 2 delivery
  • Replay old Share 2 to extend usage beyond payment period
  • Clone the deployment to multiple instances with one license

Security Guarantees

  • Information-theoretic confidentiality: Share 1 alone reveals zero information about the algorithm, even against quantum computers or unlimited time.
  • Cryptographic binding: Share 2 is HMAC-signed with connection ID (derived from customer DID + vendor DID + scope). Replay or forgery is detectable.
  • Epoch enforcement: Share 2 includes expiry timestamp. After expiry, reconstruction fails. Customer must re-fetch with current payment.
  • Tamper detection: HMAC verification happens before reconstruction. Modified shares are rejected.

Attack Scenarios

1. Reverse-Engineering Share 1

Attack: Customer extracts Share 1 from Docker image and attempts to reverse-engineer the algorithm.

Defense: XorIDA 2-of-2 split. Share 1 is uniformly random gibberish. An attacker with infinite computing power learns nothing. This is information-theoretic security, not computational.

2. Replaying Old Share 2

Attack: Customer caches Share 2 from a paid period and attempts to reuse it after payment lapses.

Defense: Share 2 includes HMAC-signed timestamp and nonce. Expired Share 2 fails reconstruction. Nonce prevents replay across epochs.

3. Cloning to Multiple Instances

Attack: Customer deploys Share 1 to multiple VMs and shares one Share 2 across all instances.

Defense: Connection ID is derived from SHA-256(customerDID + vendorDID + scope). Each deployment must register a unique DID. Vendor billing server tracks active connections per DID.

4. Man-in-the-Middle on Share 2 Delivery

Attack: Intercept Share 2 during HTTPS delivery and inject malicious data.

Defense: HTTPS with certificate pinning. HMAC verification before reconstruction. Tampered Share 2 fails HMAC check and is rejected.

ZERO-KNOWLEDGE PROPERTY
The vendor billing server never sees customer data. It only tracks payment status (boolean) and delivers Share 2 conditionally. The algorithm executes entirely on customer infrastructure. No inputs, outputs, or execution traces are transmitted.

Compliance Certifications

Full Control is designed to support FedRAMP Moderate, HIPAA, SOC 2 Type II, and ISO 27001 deployments. The vendor does not process customer data, simplifying compliance boundaries.

PERFORMANCE

Benchmarks

Full Control adds minimal overhead. Share delivery dominates latency, reconstruction is sub-millisecond.

Share Delivery Latency

Deployment Share Size Initial Fetch Cached (24h epoch)
Basic (HTTPS) ~2KB ~50ms ~0ms (no re-fetch)
Software Hardened ~2KB ~50ms ~0ms (no re-fetch)
Air-Gap (manual) ~2KB Manual import Weekly/monthly
Plus (MPC) ~6KB (3 shares) ~150ms ~0ms

Reconstruction Overhead

Algorithm Size Basic Tier Software Hardened Memory Overhead
10KB (typical) ~75µs ~5.1ms (+5ms obfuscation) ~30KB
100KB (large) ~150µs ~10.2ms (+10ms obfuscation) ~300KB
1MB (very large) ~1.2ms ~16ms (+15ms obfuscation) ~3MB

Software Hardened overhead: Control flow obfuscation, string encryption, and anti-debugging checks add 5-15ms to reconstruction time. For most workloads, this is negligible. Execution performance remains 98-92% of native speed (2-8% slowdown due to opaque predicates and control flow flattening).

Epoch Rotation

Default 24-hour epoch. Share 2 re-fetch happens in background every 24 hours. If fetch fails (payment lapsed, network down), the algorithm stops working after current Share 2 expires.

~100ms
Epoch rotation (background)
~200ms
Payment status check
0 bytes
Customer data sent

Total overhead: ~50ms initial share fetch + ~75µs reconstruction per algorithm call. After the first execution within an epoch, overhead is effectively zero until the next epoch rotation.

HONEST LIMITATIONS

What Full Control cannot do

Every technology has boundaries. Here are ours.

1. Real-Time Billing Enforcement

Full Control uses epoch-based enforcement (default 24 hours). If a customer's payment lapses, their algorithm continues working until the current Share 2 expires. For real-time enforcement (immediate cutoff), the epoch must be shortened to minutes, increasing network overhead.

2. Protection Against Determined Offline Reverse-Engineering

While Share 1 alone is information-theoretically useless, a sophisticated attacker with access to both shares (e.g., by compromising the vendor billing server) can reconstruct the algorithm. Full Control protects against customers reverse-engineering from Share 1 alone, not against attackers who steal Share 2.

3. Usage-Based Metering

Full Control enforces "is payment current?" (binary check), not "how many times did the algorithm execute?" Usage-based billing (per-API-call, per-transaction) requires telemetry, which violates the zero-surveillance design. If you need usage metering, Full Control is not the right solution.

4. Post-Execution Content Inspection

The vendor cannot see what the algorithm computed or what data it processed. If compliance requires vendor visibility into outputs (e.g., for content moderation or audit), Full Control is insufficient. Use enterprise compliance modules (xfuse, deaddrop) instead.

5. Instant Revocation

Revoking access requires waiting for the current epoch to expire. A customer with a valid Share 2 can continue using the algorithm until expiry, even if payment is revoked mid-epoch. For instant revocation, use MPC Plus tier with real-time consensus.

NOT A REPLACEMENT FOR DRM
Full Control is not DRM (Digital Rights Management). It does not prevent screen recording, data exfiltration, or manual copying of outputs. It prevents unauthorized execution of the algorithm, not unauthorized use of results.

When NOT to Use Full Control

  • Consumer software: Overhead and complexity are overkill for $10/month SaaS apps.
  • Open-source projects: If the algorithm is already public, splitting it provides no benefit.
  • Usage-based billing: Per-API-call or per-transaction pricing requires telemetry.
  • Real-time revocation: If you need instant cutoff (not epoch-based), use online activation instead.
  • Compliance visibility: If regulators require vendor access to outputs, Full Control hides too much.
ADVANCED

Advanced topics

Deep dives into cryptographic details, custom deployment patterns, and enterprise integrations.

Custom K-of-N Thresholds

Default is 2-of-2 (maximum security, zero fault tolerance). For enterprise deployments requiring redundancy, use 2-of-3 or 3-of-5. Share 1 deploys to customer, Shares 2 and 3 held by vendor (primary + backup servers).

2-of-3 deployment
const protected = await createFullControl({
  algorithm: yourFunction,
  customerDID: 'did:key:z6Mk...',
  threshold: { k: 2, n: 3 }
});

// Share 1 → customer infrastructure
// Share 2 → vendor primary billing server
// Share 3 → vendor backup billing server

// Customer needs ANY 2 of the 3 shares to execute
// If primary server is down, backup Share 3 works

Multi-Tenant Isolation

Each customer gets a unique connectionId = SHA-256(customerDID + vendorDID + scope). Scope can encode product version, feature tier, or deployment environment (e.g., trading-algo-v2-prod). This allows per-customer, per-product billing control.

Audit Trails via Xfuse

Enterprises requiring compliance records can integrate xfuse orchestration. Every Share 2 delivery is logged to an immutable audit trail with timestamp, customer DID, payment status, and HMAC signature.

Audit trail integration
import { createBillingServer } from '@private.me/full-control/server';
import { XfuseLogger } from '@private.me/xfuse';

const logger = new XfuseLogger({ auditStorePath: '/var/log/billing-audit' });

const server = createBillingServer({
  checkPayment: async (connectionId) => {
    const paymentOK = await db.checkPayment(connectionId);

    // Log every payment check to immutable audit trail
    await logger.log({
      event: 'share2_request',
      connectionId,
      paymentStatus: paymentOK,
      timestamp: new Date().toISOString()
    });

    return paymentOK;
  }
});

// Audit log is HMAC-chained, tamper-evident
// Compliance officers can verify delivery history

Hybrid Cloud + On-Prem

Some enterprises want cloud convenience with on-prem security for sensitive data. Deploy the algorithm on-prem (Full Control) but use cloud infrastructure for non-sensitive auxiliary services (logging, monitoring, dashboards).

Share 1 + proprietary algorithm run on-prem. Share 2 fetched from cloud billing server. Customer data never leaves on-prem network, but vendor retains cloud-based billing control.

Custom Epoch Durations

Default 24 hours. Configurable from 1 hour (near-real-time enforcement) to 1 month (air-gapped deployments). Shorter epochs increase network overhead. Longer epochs delay payment enforcement.

Custom epoch
const protected = await createFullControl({
  algorithm: yourFunction,
  customerDID: 'did:key:z6Mk...',
  epochDuration: 3600 // 1 hour (near-real-time)
});

// OR for air-gapped:
const airGapProtected = await createFullControl({
  algorithm: yourFunction,
  customerDID: 'did:key:z6Mk...',
  epochDuration: 2592000 // 30 days (monthly manual import)
});

Deployment Options

📦

SDK Integration

Embed directly in your application. Runs in your codebase with full programmatic control.

  • npm install @private.me/full-control
  • TypeScript/JavaScript SDK
  • Full source access
  • Enterprise support available
Get Started →
🏢

On-Premise Upon Request

Enterprise CLI for compliance, air-gap, or data residency requirements.

  • Complete data sovereignty
  • Air-gap capable deployment
  • Custom SLA + dedicated support
  • Professional services included
Request Quote →

Enterprise On-Premise Deployment

While Full Control is primarily delivered as SaaS or SDK, we build dedicated on-premise infrastructure for customers with:

  • Regulatory mandates — HIPAA, SOX, FedRAMP, CMMC requiring self-hosted processing
  • Air-gapped environments — SCIF, classified networks, offline operations
  • Data residency requirements — EU GDPR, China data laws, government mandates
  • Custom integration needs — Embed in proprietary platforms, specialized workflows

Includes: Enterprise CLI, Docker/Kubernetes orchestration, RBAC, audit logging, and dedicated support.

Contact sales for assessment and pricing →