Built on Identity, Not Credentials
The private.me platform eliminates traditional authentication primitives—shared secrets, bearer credentials, centralized key management—through DID-based identity and information-theoretic cryptography. This isn't mitigation. It's structural impossibility.
Architecture Overview
The private.me platform is built on three foundational primitives: DID-based identity (ML-DSA-65 post-quantum signatures), XorIDA threshold secret sharing (information-theoretic backup), and signed state checkpoints (non-authoritative freshness).
Every ACI (Autonomous Component with Identity) in the platform—from xBind M2M authentication to xPass password management—shares this common foundation. This unified architecture enables 224+ products to work together seamlessly while maintaining zero-knowledge properties.
Unlike traditional platforms that bolt on security features, private.me's architecture makes entire classes of attacks structurally impossible. No shared secrets means no MITM during key exchange. No bearer credentials means no token theft. No centralized key management means no single point of compromise.
Core Components
Four architectural primitives enable the entire platform: DID-based identity for authentication, XorIDA for key backup, signed checkpoints for freshness, and gateway coordination for optimization.
DID-Based Identity
Every entity (user, agent, device) has a Decentralized Identifier (did:key) backed by an ML-DSA-65 post-quantum keypair. Authentication is cryptographic proof of private key ownership—no lookup, no server, no oracle.
XorIDA Threshold Sharing
Key backup via information-theoretic threshold secret sharing (k=2, n=3 default). Any 2-of-3 shares reconstruct the key. Single share reveals zero information—not computationally hard, mathematically impossible.
Signed State Checkpoints
Non-authoritative freshness via gateway-signed DID state snapshots. Clients compare local cache against signed checkpoints to detect staleness. Malicious gateways can delay but not forge state.
Gateway Coordination
Optional relay for offline peers, push notifications, and bloom filter optimization. Gateway is non-authoritative—all security properties hold even with malicious gateway. Direct P2P works without gateway.
Eliminated Attack Surfaces
Private.me's architecture eliminates five classes of attacks by removing the vulnerable primitives entirely. These aren't mitigations—they're structural impossibilities. What doesn't exist can't be exploited.
Shared Secrets
Bearer Credentials
Key Distribution
Centralized Key Management
Rotation Coordination
Marketing Claims Backed by Technical Reality
| Marketing Claim | Technical Implementation | Verification |
|---|---|---|
| Zero key management hassle | Private keys stay on device (never transmitted). Public keys derived from DID (no secure distribution needed). Backup via XorIDA (no key escrow required). | Code audit: No key transmission in protocol. XorIDA tests: 100% coverage. Protocol spec: zero key servers. |
| Zero shared secrets | Asymmetric cryptography (ML-DSA-65). No pre-shared keys, no symmetric secrets, no key agreement protocol. | Grep codebase: No "sharedSecret" references. All signatures use ML-DSA-65. Protocol spec audit: zero symmetric operations. |
| Zero bearer credentials | Every request requires fresh signature with private key. No tokens/JWTs. Replay attacks prevented via nonce + timestamp validation. | Wire protocol spec: Signature required per message. Nonce store tests: 100% pass rate. No JWT libraries in dependencies. |
| Zero key distribution | Public keys encoded in DID (did:key method). Deterministic derivation from DID string. No network calls for key lookup. | DID spec compliance: did:key method verified. No key server in architecture diagram. Extract key from DID: zero network operations. |
| Zero rotation coordination | Signed DID succession announcements. Old key signs new key. No central authority. Grace period for migration. Checkpoints detect late arrivals. | Succession tests: 100% pass. No coordinator in protocol (direct P2P works). Offline peer tests: all catch up via checkpoints. |
Security Model
The platform assumes active network attackers, compromised gateways, and malicious peers. Physical device compromise and side-channel attacks are out of scope (no protocol can protect against compromised execution environment).
In Scope
Active Network Attackers: MITM, replay attacks, message injection, traffic analysis. The protocol prevents tampering (signatures), replay (nonces), and eavesdropping (end-to-end encryption for sensitive payloads).
Compromised Gateways: Malicious coordination servers. Gateway cannot forge messages (no private keys), cannot tamper with messages (signatures detect modification), can delay/drop messages (denial of service, mitigated via direct P2P fallback).
Malicious Peers: Spoofing, impersonation attempts. DID-based identity prevents impersonation (cryptographic proof of private key ownership required). Succession announcements prevent rollback attacks (monotonic sequence numbers).
Out of Scope
Physical Device Compromise: If attacker has code execution on device, they can extract private keys from memory. Mitigation: hardware security modules (HSM), trusted execution environments (TEE), future roadmap item.
Side-Channel Attacks: Timing attacks, power analysis. We use audited libraries (mldsa-wasm) with constant-time operations. Regular dependency audits and CVE monitoring.
Integration Patterns
All 224 ACIs share the same integration patterns: DID creation, message signing, checkpoint verification, and XorIDA backup. Learn once, use everywhere.
Pattern 1: Agent Initialization
Create a new agent with DID-based identity. The agent generates an ML-DSA-65 keypair and derives a did:key identifier. Optionally back up the private key using XorIDA threshold sharing.
Pattern 2: Message Authentication
Every message includes sender DID, recipient DID, payload, timestamp, nonce, and ML-DSA-65 signature. Recipients verify signature with sender's public key (extracted from sender DID).
Pattern 3: Freshness Verification
Clients maintain local cache of peer DID state. Periodically fetch signed checkpoints from gateway. Compare local cache vs. checkpoint to detect staleness. Refresh if mismatch detected.
Pattern 4: Key Rotation
Agent generates new keypair, creates DID succession announcement (old key signs new key), broadcasts announcement to peers. Grace period allows both keys to be valid during migration.