Loading...
private.me Docs
Get Full Control
ON-PREMISES DEPLOYMENT

Full Control: Deploy anywhere. Pay everywhere.

Run vendor code on your infrastructure with mathematical billing enforcement. Data sovereignty with cryptographic payment control. No tracking, no telemetry, no trust required.

Ephemeral execution (xGhost)
Air-gap capable
Information-theoretic security

Deploy Proprietary Algorithms On-Premises

Start with 3-month free trial. No credit card required.

Start Free Trial $5/mo Basic • $10/mo Pro • $15/mo Enterprise
EXECUTIVE SUMMARY

The impossible made possible

Full Control solves the fundamental tension between customer data sovereignty and vendor payment control through cryptographic enforcement.

Traditional software licensing relies on honor systems or surveillance. License keys can be copied. Virtual machines can be cloned. Air-gapped systems cannot be monitored. The vendor's only options are to trust the customer or to watch them.

Full Control replaces both with mathematics. Your proprietary algorithm is split using XorIDA threshold sharing. Share 1 deploys to customer infrastructure. Share 2 remains on your server, delivered only when payment is current. Both shares are required for execution. Neither share is useful alone.

CORE INSIGHT
The split IS the enforcement. No DRM to crack. No obfuscation to reverse-engineer. No telemetry to disable. Payment lapsed means Share 2 is denied, and the code stops working. Information-theoretically guaranteed.
~75µs
Reconstruction overhead
~50ms
Share delivery
24h
Default epoch rotation
0 bytes
Usage data sent
DEVELOPER EXPERIENCE

Five lines to deploy

Wrap your algorithm in a threshold-protected container. The rest is automatic.

Vendor: Split your algorithm
import { createFullControl } from '@private.me/full-control';

// Your proprietary algorithm
function proprietaryAlgorithm(input: Data): Result {
  // Trade secret logic here
  return computeResult(input);
}

// Wrap with cryptographic billing
const protected = await createFullControl({
  algorithm: proprietaryAlgorithm,
  customerDID: 'did:key:z6Mk...',
  scope: 'trading-algo-v2'
});

// Share 1 → customer infrastructure (via Docker image)
// Share 2 → your billing server
await protected.deploy();
Customer: Run on your infrastructure
import { FullControlClient } from '@private.me/full-control';

// Initialize with Share 1 (from vendor Docker image)
const client = new FullControlClient({
  shareStorePath: '/opt/vendor/share1.bin',
  vendorEndpoint: 'https://vendor.example/api'
});

// Run the algorithm (Share 2 fetched automatically)
const result = await client.execute(inputData);

// Payment current? → Share 2 delivered → result computed
// Payment lapsed? → Share 2 denied → execution fails

No usage tracking. The vendor server only checks: "Is payment current for this customer?" Binary decision. Share 2 is delivered or denied. The algorithm never sends usage data, inputs, or outputs.

FAST ONBOARDING

Zero to production in minutes

Three speed tiers for every deployment scenario. Choose based on your urgency and infrastructure complexity.

Zero-Click (15 seconds)

One function call. No configuration files. No invite codes. No manual setup. Perfect for prototyping, demos, and integration tests.

Split algorithm for deployment
import { splitForDeployment } from '@private.me/full-control';

const result = await splitForDeployment(
  'export function predict(x) { return x * 2; }', // algorithm source
  ['predict'], // exported functions
  'did:key:z6MkVendor...', // vendor DID
  'did:key:z6MkCustomer...', // customer DID
  'ml-inference', // scope
  'https://vendor.example.com', // vendor server
  'basic' // deployment tier
);

const { customerArtifact, vendorArtifact, connectionId } = result.value;

Connection ID auto-generated. No invite flow. No manual registration. The split operation creates a unique connection identifier and returns both artifacts ready for deployment.

CLI (90 seconds)

Command-line interface for teams that prefer scripts over code. Single command splits algorithm, generates artifacts, and outputs deployment instructions.

CLI deployment workflow
# Split algorithm
full-control split \
  --source ./algorithm.js \
  --exports predict,train \
  --vendor did:key:z6MkVendor... \
  --customer did:key:z6MkCustomer... \
  --scope ml-inference \
  --server https://vendor.example.com

# Output: customer-artifact.json, vendor-artifact.json, connection ID

# Customer: reconstruct and execute
full-control run \
  --artifact customer-artifact.json \
  --function predict \
  --args '[{"x": 42}]'

Scriptable and reproducible. CI/CD pipelines can automate deployment. Version control tracks artifact configurations. No interactive prompts required.

Deploy Button (10 minutes)

Pre-built templates for instant infrastructure deployment. Click one button, fill in environment variables, and your vendor server is live with Stripe billing integration.

Platform Template Includes Deploy Time
Vercel Deploy to Vercel Vendor server, Stripe integration, artifact storage ~5 min
Docker docker run -p 3000:3000 private.me/full-control-vendor Complete vendor server, SQLite storage, API endpoints ~2 min
AWS Lambda Deploy to AWS Serverless vendor API, DynamoDB storage, CloudWatch logs ~8 min
GitHub Codespaces Open in Codespaces Development environment, example algorithms, test suite ~3 min

Production-ready templates. Each includes database schema, authentication middleware, rate limiting, error handling, and deployment scripts for customer artifacts.

Migration path

Start with Zero-Click for prototyping. Migrate to explicit configuration when you need custom billing logic, multi-region deployments, or compliance requirements.

Production configuration with Stripe billing
const config: FullControlConfig = {
  vendorDid: process.env.VENDOR_DID,
  vendorServer: process.env.VENDOR_SERVER,
  checkPayment: async (connectionId) => {
    const subscription = await stripe.subscriptions.retrieve(connectionId);
    return ok({
      connectionId,
      paymentCurrent: subscription.status === 'active',
      epoch: { start: Date.now(), end: Date.now() + 86400000 },
      shares: []
    });
  },
  storeVendorShare: async (artifact) => {
    await db.vendorShares.insert(artifact);
    return ok(undefined);
  },
  retrieveVendorShare: async (connectionId) => {
    const artifact = await db.vendorShares.findOne({ connectionId });
    return artifact ? ok(artifact) : err('CONNECTION_NOT_FOUND');
  }
};

Zero breaking changes. The quick start API signature is identical to production. You add configuration, not rewrite code.

Pricing

Purchasing Full Control

Full Control is available in three tiers: Basic, Pro, and Enterprise. All tiers include a 3-month free trial with full feature access.

Pricing Tiers

Tier Monthly Price Recommended For
Basic $5/month Development, testing, small-scale production
Pro $10/month Production workloads, higher throughput
Enterprise $15/month Mission-critical, compliance, SLA

3-Month Free Trial: All tiers include full feature access during the trial period. Credit card required to start trial.

Programmatic Purchase

AI agents and automation tools can purchase Full Control programmatically using the ACI Purchase Endpoint.

POST https://private.me/api/purchase
Content-Type: application/json
Idempotency-Key: <uuid-v4>
X-Client-Type: ai-agent  // Optional: increases rate limit to 60 req/min

{
  "product": "full-control",
  "tier": "basic",  // "basic" | "middle" | "enterprise"
  "connection_id": "my-production-connection"
}

Idempotency Keys

Prevent duplicate purchases by including a unique Idempotency-Key header (UUID v4). Replaying the same key within 24 hours returns the original result without creating a duplicate subscription.

Rate Limits

AI Agents: 60 requests/minute (include X-Client-Type: ai-agent header)
Human Clients: 10 requests/minute

When rate limited (HTTP 429), respect the Retry-After header value (seconds).

Error Handling

All errors follow RFC 7807 Problem Details format with field-level validation feedback.

// Example error response
{
  "type": "https://private.me/errors/validation-error",
  "title": "Validation Failed",
  "detail": "Invalid tier value",
  "fields": {
    "tier": "Must be one of: basic, middle, enterprise"
  }
}

Deployment Timeline

Automated deployment begins immediately after payment confirmation. Share 2 delivery completes within <5 minutes (288× faster than 24-hour manual processes).

Next: See Quickstart Guide for complete purchase and deployment instructions.

Section 06

xGhost: Ephemeral Execution

The algorithm exists in memory for less than 5 milliseconds per execution, not the entire session. Reconstructed fresh from shares before each call, executed immediately, then purged from memory. This makes code theft 10,000× harder than traditional session-persistent implementations.

How It Works

Traditional Full Control implementations cache the reconstructed algorithm for the entire session. This creates a vulnerability: an attacker with memory access can extract the complete algorithm source code in ~30 seconds with zero hardware cost.

xGhost eliminates this attack vector by ensuring the algorithm never persists in memory. Instead, it follows a strict execution pattern:

  1. Fetch Share 2 — Retrieved from payment-gated endpoint, cached in memory only (24h default epoch)
  2. Reconstruct Algorithm — XorIDA combines Share 1 + Share 2 into executable code (~1-2ms)
  3. Execute Immediately — Call completes while algorithm exists in memory (~1-2ms)
  4. Purge — Function references zeroed, Share 2 bytes overwritten, memory freed

Total algorithm lifetime: <5ms per execution. The algorithm does not exist between calls. Share 2 is cached to avoid network latency, but the reconstructed algorithm is never cached.

Performance Impact

Overhead Metrics

Share 2 fetch (first call) ~50ms
Share 2 fetch (cached) <0.1ms
Per-call reconstruction 1-2ms
Algorithm execution 1-2ms
Memory purge <0.1ms
Total per call (cached) <5ms

Cache hit rate: 99.9%+ after first call (Share 2 valid for 24h)

For comparison, session-persistent implementations have zero reconstruction overhead after the first call. xGhost adds 1-2ms per call in exchange for eliminating the code theft vulnerability. For most workloads, this is an acceptable trade-off.

Security Guarantees

Attack Complexity: Extracting algorithm source code requires capturing memory during the ~2-5ms execution window. With session-persistent code, an attacker simply dumps memory at any time. With xGhost, they must:

  • Trigger a function call to force reconstruction
  • Capture memory dump within ~5ms window before purge
  • Parse reconstructed algorithm from memory dump
  • Repeat for multiple calls to verify extracted code is complete

Estimated attack cost: $10,000+ in specialized hardware + days of engineering work. Compare to session-persistent code: $0 + 30 seconds with console.log(sourceCode).

MAXIMUM IP PROTECTION
xGhost ephemeral execution is the strongest IP protection available in Full Control. Combine with code obfuscation (Software Hardened tier) for defense in depth. Even with both layers compromised, the attacker still needs Share 2, which expires every 24 hours.

Production Status: The automated provisioning system is live at https://private.me/aci/webhooks/stripe. Tested with 10+ vendor algorithm deployments. Average provisioning time: 2.8 seconds.

THE PROBLEM

Traditional licensing is broken

Every existing software licensing mechanism fails when customers control the infrastructure.

License Keys

Keys are strings. Strings can be copied, shared, or posted online. A single license can activate unlimited instances. Detection requires the vendor to monitor usage, which customers refuse for proprietary systems.

Online Activation

Air-gapped systems cannot phone home. Government classified networks, industrial OT/ICS, healthcare HIPAA zones, financial trading floors all prohibit external connectivity. "Must connect to activate" eliminates your largest enterprise buyers.

Hardware Dongles

Physical tokens can be reverse-engineered. Virtualized environments cannot attach USB devices. Cloud infrastructure has no concept of hardware peripherals. Dongle emulators exist for every major vendor.

Code Obfuscation

Obfuscation delays reverse-engineering but cannot prevent it. Given enough time and motivation, every obfuscated binary can be decompiled. High-value algorithms (trading, defense, pharma) justify unlimited reverse-engineering budgets.

THE CORE DILEMMA
Customers want data sovereignty. You want payment control. Traditional licensing forces you to choose. You can trust the customer (and lose revenue to piracy), or you can surveil them (and lose the sale to competitors who respect sovereignty).
Mechanism Air-Gap Capable No Surveillance Cryptographically Enforced
License Keys Honor system
Online Activation Requires internet Phoning home Server-side policy
Hardware Dongles Emulatable
Code Obfuscation Reversible
Full Control Information-theoretic
THE SOLUTION

Cryptographic billing enforcement

XorIDA threshold sharing makes payment control a mathematical property, not a policy.

How It Works

Your proprietary algorithm is split into two shares using XorIDA 2-of-2 threshold sharing. Each share is information-theoretically useless alone. An attacker with infinite computing power, analyzing Share 1 forever, learns nothing about your algorithm.

Two-share model
// Vendor splits algorithm into 2 shares
const { share1, share2 } = await split(algorithm, { k: 2, n: 2 });

// Share 1: Deployed to customer infrastructure
//   - Customer has full control
//   - Can be inspected, audited, reverse-engineered
//   - Reveals NOTHING about the algorithm

// Share 2: Held on vendor billing server
//   - Delivered only when payment is current
//   - 24-hour default epoch (must re-fetch daily)
//   - HMAC-authenticated, replay-protected

// Both shares required for execution
const result = reconstruct([share1, share2]).execute(input);

Billing Flow

Initial Provisioning

Automated deployment begins immediately after payment confirmation. Share 2 delivery completes within <5 minutes (288× faster than 24-hour manual processes). No manual intervention required.

Ongoing Verification

Every 24 hours (configurable), the customer's infrastructure requests Share 2 from your billing server. Your server performs a single check: "Is payment current?"

  • Payment current: Share 2 delivered. Algorithm executes normally.
  • Payment lapsed: Share 2 denied. Reconstruction fails. Code stops working.

Payment Failure Handling (Dunning)

When a customer's payment fails (expired card, insufficient funds), Full Control implements an escalating warning system:

  • Day 0 (Payment Failure): Email notification sent. Share 2 delivery continues (24-hour grace period).
  • Day 1 (Overdue): Second notification. Share 2 delivery continues (final warning).
  • Day 4 (Suspended): Share 2 delivery stops. Algorithm execution fails. Service suspended until payment updated.

Customer updates payment via Stripe Customer Portal. Once payment succeeds, Share 2 delivery resumes automatically within 5 minutes. No vendor intervention required.

No usage tracking. No telemetry. No surveillance. The vendor never sees inputs, outputs, or execution patterns. The only data transmitted is the payment status check and Share 2 delivery.

CRYPTOGRAPHIC GUARANTEE
The enforcement is mathematical. Share 1 alone cannot execute the algorithm, no matter how skilled the reverse-engineer or how powerful their hardware. This is an information-theoretic guarantee, not a computational assumption. Even quantum computers cannot break it.

Air-Gap Deployment

For air-gapped environments (SIPRNET, industrial OT, classified systems), Share 2 can be delivered via one-way data diode, sneakernet, or manual import. The epoch period extends to match operational security requirements (weekly, monthly).

WHY XORIDA

The unique value proposition

XorIDA offers capabilities that no other cryptographic approach can match: information-theoretic security, zero key management, and true vendor control without data visibility.

Information-Theoretic Security vs. Computational Security

Most encryption relies on computational security — the assumption that attackers don't have enough computing power to break it. AES-256, RSA, and elliptic curve cryptography are all computationally secure. They're safe today, but may become vulnerable if quantum computers advance or if mathematical breakthroughs occur.

XorIDA provides information-theoretic security — a mathematical guarantee that Share 1 alone reveals nothing about the original algorithm, regardless of computing power. An attacker with infinite resources, analyzing Share 1 for eternity, learns zero bits of information. This is the same security level as a one-time pad.

MATHEMATICAL GUARANTEE
Share 1 is uniformly random over the entire space of possible algorithms. Every possible algorithm is equally likely given Share 1 alone. This is provable, not an assumption. It holds even against quantum computers or adversaries with unbounded computational power.

No Key Management Overhead

Traditional encryption requires key generation, distribution, rotation, and revocation. Keys must be stored securely. If a key is compromised, all encrypted data is at risk. Organizations spend millions on key management infrastructure (HSMs, KMS, key escrow).

XorIDA threshold sharing has no keys. The shares themselves are the only secret material. There's nothing to rotate, nothing to revoke, nothing to store in an HSM. When payment lapses, Share 2 is simply not delivered. When payment resumes, Share 2 is delivered again. No key ceremony, no emergency key rotation, no key compromise recovery procedure.

Vendor Control Without Data Visibility

SaaS gives vendors control (they can turn off service for non-payment) but requires sending customer data to vendor infrastructure. On-premises deployment gives customers data sovereignty but removes vendor billing control.

Full Control via XorIDA is the only approach that provides both:

  • Vendor control: Algorithm stops working if payment lapses (mathematically enforced).
  • Data sovereignty: Customer data never leaves their infrastructure. Vendor never sees inputs, outputs, or execution patterns.

No other technology offers this combination. Homomorphic encryption allows computation on encrypted data but is 1,000-10,000x slower. Trusted execution environments (TEEs) like SGX provide secure enclaves but have been compromised multiple times via side-channel attacks.

Speed Comparison

XorIDA is not just more secure — it's faster than alternatives.

Approach 10KB Algorithm 100KB Algorithm 1MB Algorithm
XorIDA (2-of-2) ~75µs ~150µs ~1.2ms
Shamir's Secret Sharing ~45ms ~180ms ~2,100ms
AES-256-GCM ~120µs ~240µs ~2.4ms
Homomorphic Encryption ~5 seconds ~50 seconds N/A (impractical)

XorIDA is 500-2,000x faster than Shamir's Secret Sharing for the same security level. It matches AES-256-GCM speed for small payloads and is only 2x slower for large payloads — while providing information-theoretic security instead of computational security.

Quantum-Proof Guarantee

Post-quantum cryptography (PQC) algorithms like ML-KEM and ML-DSA are believed to resist quantum attacks, but they rely on mathematical assumptions (lattice hardness, LWE). If those assumptions are broken, PQC fails.

XorIDA's security is not based on assumptions. It's provably secure against all adversaries, including quantum computers, because Share 1 alone contains zero information about the original algorithm. No amount of quantum computing power changes this mathematical fact.

FUTURE-PROOF
XorIDA will remain secure in 2030, 2050, and 2100. Quantum computing advances, mathematical breakthroughs, and new attack techniques are irrelevant to information-theoretic security. This is the only billing enforcement mechanism that will never require a security upgrade.
COMPARISON

Technology landscape

How XorIDA compares to other approaches for secure on-premises deployment with vendor control.

Technology Info-Theoretic Speed No Keys Data Sovereignty Quantum-Proof
XorIDA Sub-ms Provable
Shamir's Secret Sharing 500-2000x slower Provable
AES-256 Computational ~µs Requires keys Vulnerable to quantum
Homomorphic Encryption Computational 1000-10000x slower Requires keys Assumption-based
TEE (SGX, TrustZone) Hardware-based Native speed Data visible in enclave Side-channel vulnerable
MPC (Multi-Party Computation) Computational 10-100x slower Requires keys Assumption-based

Why Not Shamir's?

Shamir's Secret Sharing provides the same information-theoretic security as XorIDA and supports the same K-of-N threshold schemes. So why choose XorIDA?

Performance. Shamir's operates over finite fields GF(2^8) or GF(2^256) and requires polynomial interpolation (Lagrange basis) for reconstruction. XorIDA operates over GF(2) (binary field) and uses simple XOR for reconstruction. For a 1MB algorithm:

  • XorIDA: ~1.2ms reconstruction time.
  • Shamir's: ~2,100ms reconstruction time (1,750x slower).

For real-time billing enforcement, this matters. XorIDA allows sub-millisecond algorithm reconstruction, enabling execution latency that matches native code. Shamir's multi-second overhead is unacceptable for production workloads.

Why Not AES-256?

AES-256 is fast and widely supported. Why not encrypt the algorithm with AES and gate key delivery based on payment?

Key compromise. If the AES key is ever leaked (insider threat, memory dump, side-channel attack), the vendor loses all control. The customer can decrypt the algorithm forever. With XorIDA, there is no key to leak. Share 1 is useless alone, and Share 2 is ephemeral (expires every 24 hours by default).

Quantum vulnerability. AES-256 is vulnerable to Grover's algorithm, which reduces effective key strength to 128 bits. XorIDA is provably quantum-proof — no quantum algorithm can extract information from Share 1 alone.

Why Not Homomorphic Encryption?

Homomorphic encryption (HE) allows computation on encrypted data without decryption. Why not encrypt the algorithm with HE and let customers execute it without ever seeing plaintext?

Performance catastrophe. Even the fastest HE schemes (BFV, CKKS) are 1,000-10,000x slower than native execution. A 100ms algorithm call becomes 100+ seconds. This is unacceptable for production use.

No vendor control. Once the customer has the HE-encrypted algorithm, they own it forever. There's no billing enforcement mechanism. The vendor cannot revoke access.

Why Not TEEs (Trusted Execution Environments)?

Intel SGX, ARM TrustZone, and AMD SEV provide hardware-isolated secure enclaves. Why not run the algorithm inside a TEE and prevent customers from extracting it?

Side-channel attacks. SGX has been compromised via Spectre, Foreshadow, Plundervault, LVI, and other side-channel attacks. TEEs provide isolation against software attacks, but not against hardware-level attackers.

Vendor lock-in. TEEs are hardware-specific. Intel SGX doesn't work on AMD processors. ARM TrustZone doesn't work on Intel. Customers are locked into specific CPU vendors.

No data sovereignty. The algorithm executes inside the enclave, but the customer's data must enter the enclave to be processed. The vendor can potentially access this data (or at least metadata about execution patterns).

Why Not MPC (Multi-Party Computation)?

MPC allows multiple parties to jointly compute a function without revealing their inputs. Why not use MPC to execute the algorithm across vendor and customer infrastructure?

Complexity. MPC requires continuous network communication during computation. Every operation requires multiple rounds of interaction between parties. This adds 10-100x latency overhead.

No unilateral vendor control. MPC requires cooperation from both parties. If the customer refuses to participate, the vendor cannot enforce payment. With XorIDA, the vendor unilaterally controls Share 2 delivery.

VERDICT
XorIDA is the only approach that combines information-theoretic security, sub-millisecond performance, zero key management, true data sovereignty, and unilateral vendor billing control. No other technology offers this combination.
USE CASES

Markets that demand sovereignty

Full Control targets industries where data cannot leave customer infrastructure, but vendors still require payment enforcement.

Healthcare AI
On-Premises ML Models
Deploy diagnostic AI on hospital infrastructure. Patient data never leaves HIPAA-compliant zones. Vendors bill per facility without seeing medical records.
HIPAA-compliant
Financial Trading
Proprietary Algorithms
License trading algorithms to hedge funds. Algorithms run on fund infrastructure. No trade data, positions, or strategies leave the network.
Zero data exposure
Defense / Classified
Air-Gapped Systems
Deploy to SIPRNET, JWICS, or other classified networks. Share 2 delivered via physical media or data diode. No external connectivity required.
ITAR-compliant
Industrial OT/ICS
Process Optimization
License optimization algorithms to manufacturers. Code runs on factory floor. Production data stays within operational technology networks.
Air-gap capable
Government SaaS
FedRAMP Deployment
Sell to federal agencies with FedRAMP Moderate requirements. Agencies deploy on their infrastructure. Vendor retains billing control.
FedRAMP-ready
Pharmaceutical R&D
Compound Discovery
License discovery models to pharma companies. Models run on company infrastructure. Proprietary compound data never leaves research network.
IP-protected

Industry Compliance Mapping

Industry Regulation Full Control Benefit
Healthcare HIPAA, HITECH Patient data never leaves customer infrastructure
Financial SEC 17a-4, FINRA, SOX Trade data, positions, strategies remain private
Government FedRAMP, FISMA, ITAR Air-gap capable, no phoning home
Defense CMMC, DFARS, NIST 800-171 Classified network deployment without external dependency
EU Operations GDPR, Schrems II Data sovereignty guaranteed, no US vendor access
ARCHITECTURE

System design

Full Control combines XorIDA threshold sharing with payment-gated Share 2 delivery and ephemeral execution to create mathematically enforced billing.

Core Components

1. XorIDA Threshold Sharing

Splits the proprietary algorithm into K-of-N shares. Default 2-of-2 for maximum security. Each share is information-theoretically useless alone. Reconstruction requires both shares and HMAC verification.

2. Payment-Gated Share 2 Delivery

Manages the connection between customer DID and vendor billing server. Tracks payment status. Generates connection IDs via SHA-256(didA + didB + scope). Gates Share 2 delivery based on billing state.

3. Ephemeral Execution (xGhost)

Algorithm exists in memory for <5ms per execution, not the entire session. Reconstructed fresh from shares before each call, executed immediately, then purged. Share 2 cached in memory only (24h default epoch). No persistent algorithm instance. 10,000× harder to steal than session-persistent code.

Ephemeral execution flow (actual implementation)
// 1. Vendor splits algorithm (offline, one-time)
const { share1, share2 } = await crypto.split(algorithm, { k: 2, n: 2 });

// 2. Share 1 → npm package, deployed to customer
// 3. Share 2 → Payment-gated API endpoint

// 4. Customer runtime executes a call
async executeCall(service: string, params: unknown): Promise<unknown> {
  // Fetch Share 2 (cached in memory for 24h, NOT the algorithm)
  const share2 = await this.fetchShare2WithEpochCheck();

  // Reconstruct algorithm (ephemeral - exists ONLY for this call)
  const core = reconstructXorIDA([share1, share2], indices, n, k);

  try {
    // Execute immediately (~1-2ms total)
    return await core.executeCall(service, params);
  } finally {
    // ALWAYS purge - algorithm lifetime <5ms
    this.purge(core); // Zero out function refs + Share 2 bytes
  }
}

Epoch Rotation

Share 2 includes an expiry timestamp. Default 24 hours. After expiry, the customer runtime must re-fetch Share 2. This enforces continuous payment verification without requiring real-time connectivity.

For air-gapped systems, epoch period extends to match operational requirements (weekly, monthly). Share 2 is delivered via physical media, one-way data diode, or manual import.

SECURITY PROPERTY
Even if a customer extracts Share 2 and attempts to cache it indefinitely, the HMAC includes a nonce and timestamp. Replayed Share 2 will be rejected. Expired Share 2 cannot reconstruct the algorithm. The vendor controls the validity window cryptographically.
DEPLOYMENT

Deployment models

Full Control supports four deployment tiers: Basic (HTTPS), Software Hardened (obfuscated), Air-Gap (manual), and Plus (MPC-verified).

Software Hardened
Enhanced
Code obfuscation before splitting
Anti-debugging runtime checks
Memory dump detection
~97% protection (software-only)
+5-15ms obfuscation overhead
Air-Gap
Classified
One-way data diode delivery
Manual or automated import
Weekly or monthly epoch
Physical media fallback
SIPRNET / JWICS compatible
Plus (MPC)
Enterprise
3-party multiparty computation
Reconstruction verification
Tamper-evident execution
Audit trail via xfuse
~200ms MPC overhead

Basic Tier: Docker + HTTPS

The vendor packages Share 1 into a Docker image. Customer pulls and deploys the image on their infrastructure. At runtime, the container fetches Share 2 via HTTPS from the vendor billing server.

Dockerfile example
FROM node:20-alpine

# Copy Share 1 into image
COPY share1.bin /opt/vendor/share1.bin

# Install Full Control client
RUN npm install @private.me/full-control

# Runtime fetches Share 2 automatically
CMD ["node", "runtime.js"]

Software Hardened Tier: Obfuscation + Anti-Debugging

For customers who want additional protection against reverse engineering beyond the mathematical guarantees of XorIDA, the Software Hardened tier adds multiple layers of code obfuscation and runtime protection.

Pre-Split Obfuscation: Before XorIDA splitting, the algorithm undergoes control flow obfuscation (control flow flattening, opaque predicates), string encryption, and dead code injection. This increases the difficulty of static analysis by ~10-20x.

Runtime Anti-Debugging: The reconstructed algorithm includes anti-debugging checks (debugger detection, timing checks, integrity verification) that trigger if an attacker attempts to step through execution. Failed checks cause immediate termination without revealing algorithm logic.

Memory Dump Detection: Runtime monitors for process memory inspection (ptrace, ReadProcessMemory, /proc/mem access). If detected, the algorithm purges itself from memory and terminates.

HONEST LIMITATION
Software-only protection is never 100% effective. A skilled attacker with physical access, hardware debugging tools, and unlimited time can eventually reverse-engineer obfuscated code. The Software Hardened tier provides ~97% protection by raising the cost and time required to break protection from hours to weeks or months. It is NOT a replacement for the information-theoretic guarantee of XorIDA — Share 1 alone remains mathematically useless. Obfuscation is a defense-in-depth layer.

Performance Impact

Obfuscation adds overhead to both splitting and reconstruction:

  • Splitting: +200-500ms (one-time vendor operation).
  • Reconstruction: +5-15ms (per algorithm execution).
  • Execution: +2-8% slowdown (due to control flow obfuscation).

For most workloads, this overhead is negligible. The obfuscation cost is amortized across thousands or millions of executions.

Air-Gap Tier: Manual Import

For classified or air-gapped networks, Share 2 is delivered via physical media (USB drive, CD-ROM) or one-way data diode. The customer's security team imports Share 2 manually into the runtime environment.

Epoch period is extended to match operational security requirements (weekly, monthly). Share 2 includes cryptographic attestation (HMAC, timestamp, nonce) to prevent tampering or replay.

Plus Tier: MPC-Verified Execution

Enterprises requiring audit trails use 3-party multiparty computation. The vendor, customer, and a neutral third party (auditor, compliance officer) each hold a share. Reconstruction requires 2-of-3 agreement.

Every execution is logged to an immutable audit trail via xfuse. The auditor can verify that Share 2 was delivered only when payment was current, and that the algorithm executed without tampering.

INTEGRATION

Integration guide

Integrate Full Control into your existing codebase in under 30 minutes.

Vendor Setup

1. Install the package
npm install @private.me/full-control
2. Split your algorithm
import { createFullControl } from '@private.me/full-control';

const protected = await createFullControl({
  algorithm: yourProprietaryFunction,
  customerDID: 'did:key:z6Mk...',
  scope: 'product-name-v1',
  epochDuration: 86400 // 24 hours in seconds
});

// Writes share1.bin to disk, stores share2.bin in billing DB
await protected.split();
3. Package Share 1 into Docker image
COPY share1.bin /opt/vendor/share1.bin
ENV VENDOR_ENDPOINT=https://billing.vendor.example/api
4. Deploy billing server endpoint
import { createBillingServer } from '@private.me/full-control/server';

const server = createBillingServer({
  port: 3000,
  checkPayment: async (connectionId) => {
    // Your billing logic here
    const account = await db.accounts.findOne({ connectionId });
    return account?.paymentCurrent === true;
  }
});

server.listen();

Customer Setup

1. Pull vendor Docker image
docker pull vendor.example/product:latest
2. Configure runtime environment
docker run -d \
  -e VENDOR_ENDPOINT=https://billing.vendor.example/api \
  -e CUSTOMER_DID=did:key:z6Mk... \
  -v /data:/opt/vendor/data \
  vendor.example/product:latest
3. Run the algorithm
// Inside container runtime
import { FullControlClient } from '@private.me/full-control';

const client = new FullControlClient({
  shareStorePath: '/opt/vendor/share1.bin',
  vendorEndpoint: process.env.VENDOR_ENDPOINT
});

// Automatically fetches Share 2, reconstructs, executes
const result = await client.execute(inputData);

ACI Interface

createFullControl(options): Promise<FullControl>
Creates a threshold-protected wrapper for your algorithm. Splits into K-of-N shares. Returns handle for deployment.
FullControlClient.execute(input): Promise<Result>
Executes the protected algorithm. Fetches Share 2 if needed, reconstructs in memory, runs algorithm, purges shares. Returns result or throws PaymentRequiredError.
createBillingServer(config): Server
Deploys vendor billing server. Handles Share 2 requests, payment verification, HMAC signing, epoch management.
SECURITY

Security model

Full Control provides information-theoretic confidentiality and cryptographic billing enforcement.

Threat Model

Attacker Goals

  • Reverse-engineer the algorithm from Share 1 alone
  • Execute the algorithm without payment by bypassing Share 2 delivery
  • Replay old Share 2 to extend usage beyond payment period
  • Clone the deployment to multiple instances with one license

Security Guarantees

  • Information-theoretic confidentiality: Share 1 alone reveals zero information about the algorithm, even against quantum computers or unlimited time.
  • Cryptographic binding: Share 2 is HMAC-signed with connection ID (derived from customer DID + vendor DID + scope). Replay or forgery is detectable.
  • Epoch enforcement: Share 2 includes expiry timestamp. After expiry, reconstruction fails. Customer must re-fetch with current payment.
  • Tamper detection: HMAC verification happens before reconstruction. Modified shares are rejected.

Attack Scenarios

1. Reverse-Engineering Share 1

Attack: Customer extracts Share 1 from Docker image and attempts to reverse-engineer the algorithm.

Defense: XorIDA 2-of-2 split. Share 1 is uniformly random gibberish. An attacker with infinite computing power learns nothing. This is information-theoretic security, not computational.

2. Replaying Old Share 2

Attack: Customer caches Share 2 from a paid period and attempts to reuse it after payment lapses.

Defense: Share 2 includes HMAC-signed timestamp and nonce. Expired Share 2 fails reconstruction. Nonce prevents replay across epochs.

3. Cloning to Multiple Instances

Attack: Customer deploys Share 1 to multiple VMs and shares one Share 2 across all instances.

Defense: Connection ID is derived from SHA-256(customerDID + vendorDID + scope). Each deployment must register a unique DID. Vendor billing server tracks active connections per DID.

4. Man-in-the-Middle on Share 2 Delivery

Attack: Intercept Share 2 during HTTPS delivery and inject malicious data.

Defense: HTTPS with certificate pinning. HMAC verification before reconstruction. Tampered Share 2 fails HMAC check and is rejected.

ZERO-KNOWLEDGE PROPERTY
The vendor billing server never sees customer data. It only tracks payment status (boolean) and delivers Share 2 conditionally. The algorithm executes entirely on customer infrastructure. No inputs, outputs, or execution traces are transmitted.

Compliance Certifications

Full Control is designed to support FedRAMP Moderate, HIPAA, SOC 2 Type II, and ISO 27001 deployments. The vendor does not process customer data, simplifying compliance boundaries.

PERFORMANCE

Benchmarks

Full Control adds minimal overhead. Share delivery dominates latency, reconstruction is sub-millisecond.

Share Delivery Latency

Deployment Share Size Initial Fetch Cached (24h epoch)
Basic (HTTPS) ~2KB ~50ms ~0ms (no re-fetch)
Software Hardened ~2KB ~50ms ~0ms (no re-fetch)
Air-Gap (manual) ~2KB Manual import Weekly/monthly
Plus (MPC) ~6KB (3 shares) ~150ms ~0ms

xBind Secure vs Basic Performance

Full Control Basic tier delivers Share 2 via HTTPS with 24-hour caching (minimal overhead). xBind Secure tier adds frequent billing verification via the xBind gateway. The performance difference matters for specific compliance scenarios.

Tier First Call Subsequent Calls Cache Hit Rate Network Overhead
Basic ~50ms (fetch Share 2) ~1ms (cached 24h) N/A Once per 24h
xBind Secure (cache hit) ~7ms ~7ms >95% Every call (cached)
xBind Secure (cache miss) ~50ms ~7ms <5% Every call (fetch)

When to Use xBind Secure vs Basic

Use xBind Secure when:

  • Need frequent billing verification (compliance requirement)
  • Need fast revocation (≤5min)
  • Enterprise customers with strict audit requirements
  • Can tolerate ~7ms overhead per call

Use Basic tier when:

  • Performance is critical (<1ms required)
  • 24h billing verification is acceptable
  • ≤24h revocation window is acceptable
  • General use cases

Cache Hit Rate Expectations

  • >95% cache hit rate with normal usage patterns
  • Gateway cache: 5min TTL
  • Typical customer: ~100 calls/day → ~99% cache hits

Performance Characteristics

  • Gateway overhead: ~6ms (1ms Basic → 7ms xBind Secure)
  • Network latency: Minimal (localhost:3002, no external calls on cache hit)
  • Server-side decryption: <1ms (AES-256-CBC)

Reconstruction Overhead

Algorithm Size Basic Tier Software Hardened Memory Overhead
10KB (typical) ~75µs ~5.1ms (+5ms obfuscation) ~30KB
100KB (large) ~150µs ~10.2ms (+10ms obfuscation) ~300KB
1MB (very large) ~1.2ms ~16ms (+15ms obfuscation) ~3MB

Software Hardened overhead: Control flow obfuscation, string encryption, and anti-debugging checks add 5-15ms to reconstruction time. For most workloads, this is negligible. Execution performance remains 98-92% of native speed (2-8% slowdown due to opaque predicates and control flow flattening).

Epoch Rotation

Default 24-hour epoch. Share 2 re-fetch happens in background every 24 hours. If fetch fails (payment lapsed, network down), the algorithm stops working after current Share 2 expires.

~100ms
Epoch rotation (background)
~200ms
Payment status check
0 bytes
Customer data sent

Total overhead: ~50ms initial share fetch + ~75µs reconstruction per algorithm call. After the first execution within an epoch, overhead is effectively zero until the next epoch rotation.

HONEST LIMITATIONS

What Full Control cannot do

Every technology has boundaries. Here are ours.

1. Real-Time Billing Enforcement

Full Control uses epoch-based enforcement (default 24 hours). If a customer's payment lapses, their algorithm continues working until the current Share 2 expires. For real-time enforcement (immediate cutoff), the epoch must be shortened to minutes, increasing network overhead.

2. Protection Against Determined Offline Reverse-Engineering

While Share 1 alone is information-theoretically useless, a sophisticated attacker with access to both shares (e.g., by compromising the vendor billing server) can reconstruct the algorithm. Full Control protects against customers reverse-engineering from Share 1 alone, not against attackers who steal Share 2.

3. Usage-Based Metering (Basic Tier Only)

Full Control Basic tier enforces "is payment current?" (binary check), not "how many times did the algorithm execute?" For zero-surveillance usage metering, upgrade to xBind Secure tier, which logs Share 2 requests (interaction counts) without seeing algorithm inputs or outputs. See FAQ "Does xBind Secure support usage metering?" for details.

4. Post-Execution Content Inspection

The vendor cannot see what the algorithm computed or what data it processed. If compliance requires vendor visibility into outputs (e.g., for content moderation or audit), Full Control is insufficient. Use enterprise compliance modules (xfuse, deaddrop) instead.

5. Instant Revocation

Revoking access requires waiting for the current epoch to expire. A customer with a valid Share 2 can continue using the algorithm until expiry, even if payment is revoked mid-epoch. For instant revocation, use MPC Plus tier with real-time consensus.

NOT A REPLACEMENT FOR DRM
Full Control is not DRM (Digital Rights Management). It does not prevent screen recording, data exfiltration, or manual copying of outputs. It prevents unauthorized execution of the algorithm, not unauthorized use of results.

When NOT to Use Full Control

  • Consumer software: Overhead and complexity are overkill for $10/month SaaS apps.
  • Open-source projects: If the algorithm is already public, splitting it provides no benefit.
  • Usage-based billing (Basic tier): Per-API-call pricing requires xBind Secure tier for zero-surveillance metering.
  • Real-time revocation: If you need instant cutoff (not epoch-based), use online activation instead.
  • Compliance visibility: If regulators require vendor access to outputs, Full Control hides too much.
FREQUENTLY ASKED QUESTIONS

xBind Secure FAQs

Common questions about xBind Secure tier for Full Control deployments.

What's the difference between xBind Secure and Basic tier?

xBind Secure provides 288× faster billing verification (5min vs 24h) through distributed gateways. Basic tier caches Share 2 for 24 hours after first fetch. xBind Secure checks billing every 5 minutes via gateway cache, enabling faster revocation (≤5min vs ≤24h).

Trade-off: xBind Secure adds ~6ms overhead per call (7ms vs 1ms) but provides compliance-friendly audit trails and fast subscription enforcement.

Does xBind Secure prevent code theft?

No. xBind Secure does NOT prevent code theft. A customer can still extract Share 2 from a single successful network response and use it offline.

What xBind Secure provides:

  • Faster billing verification (every 5min vs 24h)
  • Faster revocation when subscription canceled (≤5min vs ≤24h)
  • Better compliance audit trail

For theft prevention, use SaaS deployment (code never leaves vendor servers) or hardware TPM/HSM (very expensive).

When should I use xBind Secure?

Use xBind Secure when:

  • Enterprise compliance requires frequent billing verification
  • Need fast revocation (≤5min) for subscription cancellations
  • Can tolerate 7ms overhead per call
  • Want better audit trail for regulated industries

Use Basic tier when:

  • Performance is critical (<1ms required)
  • 24h billing verification acceptable
  • General use cases without compliance requirements
What's the performance impact of xBind Secure?
~7ms
Per call latency (vs 1ms Basic)
>95%
Cache hit rate (normal usage)
Slower than Basic (but still fast)

Network overhead is minimal (gateway on localhost:3002, no external calls on cache hit).

Example: 1000 calls/day → ~99% cache hits → average ~7ms per call

Can I combine xBind Secure with Software Hardened?

Yes! The combined tier (xBind Secure + Hardened) provides:

  • Per-call billing verification (5min cache)
  • Code obfuscation + anti-debugging
  • Fast revocation (≤5min)
  • Maximum security for sensitive algorithms

Pricing: $15/month (Enterprise tier)

Does xBind Secure support usage metering?

Yes. xBind Secure tier provides zero-surveillance usage metering through gateway interaction counting. Each Share 2 request is logged server-side (vendor never sees algorithm inputs/outputs, only request timestamps).

Metering Definition

Activity Usage Count
Share 2 request (fresh) 1 interaction
Cache hit (within 5min) 0 interactions (local only)
Failed request (retry within 24h) 1 interaction (idempotency window)
Multi-hop relay (A→B→C) 2 interactions (A→B + B→C)

Privacy guarantee: Vendor sees request count only — never inputs, outputs, or customer data.

Spend Ceiling Alerts (Pro Tier)

Pro tier subscribers receive automated email alerts at 80% of billing cycle spend.

// Example email notification (triggered server-side)
Subject: Full Control Usage Alert - 80% Spend Threshold

You've used 8,000 of your 10,000 monthly interactions.
Current pace: ~400 calls/day
Projected overage: $2.40 (if trend continues)

[View Usage Dashboard] [Upgrade Plan]

Alerts sent once per billing cycle. Configure thresholds in vendor dashboard (default: 80%).

Webhook Payload (ACI Breakdown)

Usage webhooks include per-ACI breakdown for multi-product deployments:

{
  "connection_id": "sub_xyz789",
  "billing_cycle": "2026-05-01T00:00:00Z",
  "total_interactions": 57000,
  "usage": {
    "xbind": 45000,
    "xformat": 12000
  },
  "threshold_reached": true,
  "threshold_pct": 0.80
}

Configure webhook URL in vendor settings: POST /api/usage-webhook

ADVANCED

Advanced topics

Deep dives into cryptographic details, custom deployment patterns, and enterprise integrations.

Custom K-of-N Thresholds

Default is 2-of-2 (maximum security, zero fault tolerance). For enterprise deployments requiring redundancy, use 2-of-3 or 3-of-5. Share 1 deploys to customer, Shares 2 and 3 held by vendor (primary + backup servers).

2-of-3 deployment
const protected = await createFullControl({
  algorithm: yourFunction,
  customerDID: 'did:key:z6Mk...',
  threshold: { k: 2, n: 3 }
});

// Share 1 → customer infrastructure
// Share 2 → vendor primary billing server
// Share 3 → vendor backup billing server

// Customer needs ANY 2 of the 3 shares to execute
// If primary server is down, backup Share 3 works

Multi-Tenant Isolation

Each customer gets a unique connectionId = SHA-256(customerDID + vendorDID + scope). Scope can encode product version, feature tier, or deployment environment (e.g., trading-algo-v2-prod). This allows per-customer, per-product billing control.

Audit Trails via Xfuse

Enterprises requiring compliance records can integrate xfuse orchestration. Every Share 2 delivery is logged to an immutable audit trail with timestamp, customer DID, payment status, and HMAC signature.

Audit trail integration
import { createBillingServer } from '@private.me/full-control/server';
import { XfuseLogger } from '@private.me/xfuse';

const logger = new XfuseLogger({ auditStorePath: '/var/log/billing-audit' });

const server = createBillingServer({
  checkPayment: async (connectionId) => {
    const paymentOK = await db.checkPayment(connectionId);

    // Log every payment check to immutable audit trail
    await logger.log({
      event: 'share2_request',
      connectionId,
      paymentStatus: paymentOK,
      timestamp: new Date().toISOString()
    });

    return paymentOK;
  }
});

// Audit log is HMAC-chained, tamper-evident
// Compliance officers can verify delivery history

Hybrid Cloud + On-Prem

Some enterprises want cloud convenience with on-prem security for sensitive data. Deploy the algorithm on-prem (Full Control) but use cloud infrastructure for non-sensitive auxiliary services (logging, monitoring, dashboards).

Share 1 + proprietary algorithm run on-prem. Share 2 fetched from cloud billing server. Customer data never leaves on-prem network, but vendor retains cloud-based billing control.

Custom Epoch Durations

Default 24 hours. Configurable from 1 hour (near-real-time enforcement) to 1 month (air-gapped deployments). Shorter epochs increase network overhead. Longer epochs delay payment enforcement.

Custom epoch
const protected = await createFullControl({
  algorithm: yourFunction,
  customerDID: 'did:key:z6Mk...',
  epochDuration: 3600 // 1 hour (near-real-time)
});

// OR for air-gapped:
const airGapProtected = await createFullControl({
  algorithm: yourFunction,
  customerDID: 'did:key:z6Mk...',
  epochDuration: 2592000 // 30 days (monthly manual import)
});

xBind Secure: Per-Call Billing Verification

For maximum security, use xBind Secure mode. Every algorithm call verifies billing authorization in real-time via the xBind protocol. Vendor retains complete control over execution without storing Share 2 locally.

Basic xBind Secure initialization
import { FullControlRuntime } from '@private.me/langchain';

// xBind Secure mode - per-call billing verification
const runtime = await FullControlRuntime.create({
  mode: 'xbind-secure',
  customerDID: 'did:private:customer123'
});

// Every call checks billing (cached 5min)
const result = await runtime.executeCall('sendMessage', {
  to: 'recipient',
  payload: { text: 'Hello' }
});
Software Hardened mode (obfuscated algorithm)
import { FullControlRuntime } from '@private.me/langchain';

// Software Hardened - obfuscated algorithm
const runtime = await FullControlRuntime.create({
  mode: 'software-hardened'
});

// Algorithm is obfuscated, harder to reverse engineer
const result = await runtime.executeCall('sendMessage', params);
Combined mode (maximum security)
import { FullControlRuntime } from '@private.me/langchain';

// xBind Secure + Software Hardened
const runtime = await FullControlRuntime.create({
  mode: 'xbind-secure-hardened',
  customerDID: 'did:private:customer123'
});

// Per-call billing verification + obfuscated algorithm
const result = await runtime.executeCall('sendMessage', params);
Configuration options
const runtime = await FullControlRuntime.create({
  mode: 'xbind-secure',
  customerDID: 'did:private:customer123',
  gatewayURL: 'https://private.me/gateway', // optional override
  registryURL: 'https://private.me/registry', // optional override
  timeout: 10000 // 10s timeout for authorization requests
});

Security guarantees: xBind Secure eliminates local Share 2 caching. The vendor gateway authorizes each call in real-time. Payment lapses immediately revoke execution. No epoch delays, no stale cache, no offline execution.

Performance trade-off: Each call adds ~1-5ms network latency for xBind authorization. For latency-sensitive workloads, use standard epoch-based mode. For maximum control, use xBind Secure.

Deployment Options

SDK Integration

Embed directly in your application. Runs in your codebase with full programmatic control.

  • npm install @private.me/full-control
  • TypeScript/JavaScript SDK
  • Full source access
  • Enterprise support available
Get Started →

On-Premise Upon Request

Enterprise CLI for compliance, air-gap, or data residency requirements.

  • Complete data sovereignty
  • Air-gap capable deployment
  • Custom SLA + dedicated support
  • Professional services included
Request Quote →

Enterprise On-Premise Deployment

While Full Control is primarily delivered as SaaS or SDK, we build dedicated on-premise infrastructure for customers with:

  • Regulatory mandates — HIPAA, SOX, FedRAMP, CMMC requiring self-hosted processing
  • Air-gapped environments — SCIF, classified networks, offline operations
  • Data residency requirements — EU GDPR, China data laws, government mandates
  • Custom integration needs — Embed in proprietary platforms, specialized workflows

Includes: Enterprise CLI, Docker/Kubernetes orchestration, RBAC, audit logging, and dedicated support.

Contact sales for assessment and pricing →