Loading...
private.me Docs
Get xArmor
PRIVATE.ME PLATFORM

xArmor: Split-Channel HTTPS Proxy

A transparent reverse proxy that XorIDA-splits HTTP request bodies across N independent HTTPS connections. No single upstream server sees the full payload. DID mutual authentication between all instances.

Platform / HTTPS COMING SOON XorIDA Powered DID Mutual Auth
Section 01

The Problem

HTTPS protects data in transit, but the destination server sees everything in plaintext. A compromised server endpoint, rogue admin, or insider threat exposes all request data -- credentials, payment info, medical records.

Modern APIs handle billions of sensitive requests daily. Each request terminates TLS at the server, exposing the full payload to the application layer. Server-side breaches, supply chain attacks, and insider threats mean that transit encryption alone is insufficient.

API keys stored in configuration files create a single authentication point. If the config is compromised, the attacker has full API access. There is no threshold authentication, no split-channel protection, and no way to limit what any single server instance can see.

The Old Way

API Key In config file single secret Single Server Full payload visible in RAM Compromised Full data exposed from single breach
Section 02

The PRIVATE.ME Solution

xArmor sits as a transparent reverse proxy that intercepts HTTP request bodies, splits them via XorIDA into N shares, and sends each share over an independent HTTPS connection to a separate upstream instance. DID-based mutual authentication ensures only verified instances participate.

No single upstream server ever sees the complete request payload. Even if one server is fully compromised, the attacker obtains only one share -- which reveals zero information about the original data without K-1 additional shares.

DID mutual authentication replaces static API keys with cryptographic identity. Each proxy instance has an Ed25519 DID. Requests are signed and verified. No shared secrets, no config files to steal, no key rotation ceremonies.

The New Way

DID Identity Ed25519 keypair Split Auth XorIDA proxy Channel 1 HTTPS + Share Channel 2 HTTPS + Share Channel 3 HTTPS + Share HMAC Verify Reconstruct API
Section 03

How It Works

Transparent HTTP proxy layer: client sends a normal request, xArmor intercepts, splits the body, fans out to upstream instances, and the reassembly proxy reconstructs the original payload before forwarding to the application.

Client Request Normal HTTPS POST xArmor Proxy XorIDA split + DID sign N Independent HTTPS Channels (DID mutual auth) Each carries one share to a separate upstream Reassembly Proxy HMAC verify + reconstruct Application Sees full payload
Key Security Properties
Zero-knowledge upstreams: Each upstream instance sees only one share. No single instance can reconstruct the payload.
DID mutual auth: Ed25519 identity replaces API keys. No shared secrets, no config files, no rotation needed.
Transparent to clients: Clients send normal HTTPS requests. No SDK integration required on the client side.
Section 04

Use Cases

🏦
Banking
Payment API Protection

Payment request bodies split across independent processing nodes. No single node sees full card data. PCI DSS scope reduction through architectural separation.

PCI DSS
🏥
Healthcare
Health Data Exchange

PHI transmitted via split channels between healthcare systems. No single network path carries complete patient data. HIPAA compliance through information-theoretic protection.

HIPAA / HL7
🏛
Government
Government API Protection

Classified data API requests split across independent networks. Meets separation requirements for multi-level security architectures. DID auth replaces CAC/PIV for machine-to-machine.

FISMA / FedRAMP
Cloud
Multi-Cloud API Routing

API requests split across AWS, Azure, and GCP. No single cloud provider sees complete request data. Eliminates cloud vendor lock-in as a security risk.

Multi-Cloud
Section 05

Integration

Quick Start
import { createProxy, configureRoutes } from '@private.me/xarmor';

// Create split-channel proxy with 3 upstreams
const proxy = await createProxy({
  n: 3,
  k: 2,
  upstreams: [
    'https://us-east.api.example.com',
    'https://eu-west.api.example.com',
    'https://ap-south.api.example.com',
  ],
});

// Configure which routes to split
configureRoutes(proxy, {
  split: ['/api/payments', '/api/patients'],
  passthrough: ['/api/health'],
});
createProxy(config: { n: number, k: number, upstreams: string[] }): Promise<HttpSplitProxy>
Creates a transparent reverse proxy that XorIDA-splits HTTP request bodies across N upstream instances. DID mutual authentication is established automatically between all instances.
configureRoutes(proxy: HttpSplitProxy, routes: RouteConfig): void
Configures which URL patterns trigger split-channel routing and which pass through unchanged. Split routes have their request bodies distributed; passthrough routes are forwarded normally.
Section 06

Security Properties

PropertyMechanismGuarantee
Payload SecrecyXorIDA split across upstreamsNo single upstream sees full request
Machine IdentityEd25519 DID mutual authCryptographic identity, no shared secrets
IntegrityHMAC-SHA256 per shareTamper detection before reconstruction
Fault ToleranceK-of-N thresholdN-K upstream failures tolerated
TransparencyReverse proxy patternNo client-side changes required
0
API keys needed
N
Independent channels
2.0x
Bandwidth overhead
<1ms
Typical payload
Section 07

Benchmarks

Performance characteristics measured on Node.js 22, Apple M2. xArmor adds minimal latency while eliminating plaintext exposure at the proxy layer.

~5ms
Proxy Roundtrip
~1ms
XorIDA Split
<0.5ms
AES Re-encrypt
0 bits
Per-share Leakage
OperationTimeNotes
TLS termination<1msStandard TLS 1.3 handshake at edge
XorIDA split (1 KB payload)~58µs2-of-2 threshold split over GF(2)
HMAC-SHA256 per share<0.1msIntegrity tag before routing
Share routing to backends~1–3msNetwork-dependent, parallel delivery
Reconstruct from shares~58µsHMAC verification + XOR reconstruction
AES-256-GCM re-encrypt<0.5msRe-encryption for downstream delivery
Full proxy pipeline~5msEnd-to-end: TLS → split → route → reconstruct → deliver

Comparison: Traditional Proxy vs xArmor

PropertyTraditional Reverse ProxyxArmor
Plaintext exposureFull payload visible at proxyZero — split before routing
Breach impactComplete data lossIndividual share is meaningless
Quantum resistanceTLS vulnerable to harvest-nowIT-secure — no keys to break
Added latency~0ms (passthrough)~4ms (split + route + reconstruct)
Audit trailLog-based onlyHMAC-chained cryptographic proof
VERIFIABLE WITHOUT CODE EXPOSURE

Ship Proofs, Not Source

xArmor generates cryptographic proofs of correct execution without exposing proprietary algorithms. Verify integrity using zero-knowledge proofs — no source code required.

XPROVE CRYPTOGRAPHIC PROOF
Download proofs:

Verify proofs online →

Use Cases

🏛️
REGULATORY
FDA / SEC Submissions
Prove algorithm correctness for distributed systems without exposing trade secrets or IP.
Zero IP Exposure
🏦
FINANCIAL
Audit Without Access
External auditors verify secure operations without accessing source code or production systems.
FINRA / SOX Compliant
🛡️
DEFENSE
Classified Verification
Security clearance holders verify distributed systems correctness without clearance for source code.
CMMC / NIST Ready
🏢
ENTERPRISE
Procurement Due Diligence
Prove security + correctness during RFP evaluation without NDA or code escrow.
No NDA Required
Section 08

Honest Limitations

Five known limitations documented transparently. xArmor’s security guarantees come with measurable trade-offs.

LimitationImpactMitigation
Latency overhead ~4msThe split-route-reconstruct pipeline adds approximately 4ms compared to a traditional passthrough proxy. Latency-critical applications (<1ms SLA) may not tolerate this.4ms is imperceptible for HTTP APIs (typical response times 50–500ms). For sub-millisecond requirements, use xChange direct transport instead.
Multiple backends requiredXorIDA 2-of-2 requires at least two independent storage/routing backends. Single-backend deployments cannot use split routing.Cloud-native deployments naturally span availability zones. xStore provides pluggable backend adapters (local, S3, Azure Blob, custom).
No WebSocket supportCurrent implementation handles HTTP request/response only. Long-lived WebSocket connections are not split at the proxy layer.WebSocket traffic can be routed through xChange for real-time split-channel delivery. Proxy-level WebSocket support is on the roadmap.
TLS termination at edgeTLS must terminate at the xArmor proxy before splitting can occur. This means the proxy momentarily holds plaintext during the split operation (~58µs).The exposure window is 58 microseconds — orders of magnitude shorter than traditional proxies that hold plaintext for the entire request lifecycle. TEE isolation eliminates even this window.
Certificate managementxArmor requires its own TLS certificates separate from the origin server. Certificate rotation adds operational complexity.Standard ACME/Let’s Encrypt automation handles certificate lifecycle. xArmor certificates can be managed alongside existing infrastructure certificates.
VERIFIED BY XPROVE

Verifiable Data Protection

Every operation in this ACI produces a verifiable audit trail via xProve. HMAC-chained integrity proofs let auditors confirm that data was split, stored, and reconstructed correctly — without accessing the data itself.

XPROVE AUDIT TRAIL
Every XorIDA split generates HMAC-SHA256 integrity tags. xProve chains these into a tamper-evident audit trail that proves data was handled correctly at every step. Upgrade to zero-knowledge proofs when regulators or counterparties need public verification.

Read the xProve white paper →
GET STARTED

Ready to deploy xArmor?

Talk to Ren, our AI sales engineer, or book a live demo with our team.

Book a Demo

Deployment Options

📦

SDK Integration

Embed directly in your application. Runs in your codebase with full programmatic control.

  • npm install @private.me/xarmor
  • TypeScript/JavaScript SDK
  • Full source access
  • Enterprise support available
Get Started →
🏢

On-Premise Upon Request

Enterprise CLI for compliance, air-gap, or data residency requirements.

  • Complete data sovereignty
  • Air-gap capable deployment
  • Custom SLA + dedicated support
  • Professional services included
Request Quote →

Enterprise On-Premise Deployment

While xArmor is primarily delivered as SaaS or SDK, we build dedicated on-premise infrastructure for customers with:

  • Regulatory mandates — HIPAA, SOX, FedRAMP, CMMC requiring self-hosted processing
  • Air-gapped environments — SCIF, classified networks, offline operations
  • Data residency requirements — EU GDPR, China data laws, government mandates
  • Custom integration needs — Embed in proprietary platforms, specialized workflows

Includes: Enterprise CLI, Docker/Kubernetes orchestration, RBAC, audit logging, and dedicated support.

Contact sales for assessment and pricing →