Loading...
private.me Docs
Get xBrief
PRIVATE.ME PLATFORM

xBrief: Post-Production Collaboration

Split editorial, color, and sound assets across post-production facilities so no single facility holds complete content. Collaborate across houses without trusting any one with the full picture.

Entertainment COMING SOON XorIDA Powered
Fast Onboarding

15 Seconds to First Briefing

Traditional classified document systems require manual clearance setup, custodian key generation, and access control server configuration. xBrief collapses this to 15 seconds with zero-click accept, 90 seconds with one-line CLI, and 10 minutes with deploy buttons.

Speed Tiers

LevelSetup TimeMethodWhat It Does
Zero-Click 15 seconds Env var auto-accept Set XBRIEF_INVITE_CODE, deploy on first use. No manual setup.
CLI 90 seconds One-line command npx @private.me/xbrief init generates custodian DID, saves to .env
Deploy Button 10 minutes One-click templates Vercel/Netlify buttons provision briefing server + storage

Quick Start: Zero-Click

Zero-Click Setup (15 seconds)
# 1. Set invite code (from security officer email)
export XBRIEF_INVITE_CODE=XBR-abc123

# 2. Deploy your first briefing (auto-accepts invite)
npx @private.me/xbrief deploy \
  --content ./operation-thunder.md \
  --classification SECRET \
  --custodians alice,bob,charlie \
  --threshold 2-of-3
What Happens Automatically
1. Invite auto-accepted from XBRIEF_INVITE_CODE env var
2. Custodian DID generated and saved to .env
3. Briefing split via XorIDA (2-of-3)
4. Custodian shares distributed with HMAC integrity
5. Access control rules enforced by clearance level
6. Ready for need-to-know requests

Total time: ~15 seconds

CLI Setup (90 seconds)

CLI Setup
# Install CLI globally
npm install -g @private.me/xbrief

# Initialize (generates custodian DID, saves to .env)
xbrief init

# Deploy your first briefing
xbrief deploy \
  --content ./operation-thunder.md \
  --classification SECRET \
  --custodians alice,bob,charlie \
  --threshold 2-of-3

# Output:
# ✅ Briefing split (2-of-3)
# ✅ Custodian shares distributed
# ✅ Access control enabled
# ✅ Ready for need-to-know requests

Deploy Button Setup (10 minutes)

Click one button to provision briefing server + custodian share storage on Vercel/Netlify/Railway:

Deploy to Vercel Deploy to Netlify
Includes
  • Briefing management server (access control, revocation API)
  • Custodian share storage (AES-256-GCM encrypted at rest)
  • Access request dashboard
  • Audit trail analytics

After deployment: Environment variables auto-configured, custodian DID auto-generated, ready to deploy briefings immediately.

Section 01

The Problem

Post-production workflows span editorial houses, color grading facilities, sound studios, and VFX vendors — each receiving complete copies of content they need. One breach at any facility exposes finished or near-finished footage, the most valuable and leakable form of content.

The post-production phase is when content is most vulnerable: picture-locked footage, final color grades, mixed audio tracks, and completed VFX shots all exist as complete, viewable files across multiple independent facilities. Each facility's network is a potential leak point.

High-profile leaks consistently originate from post-production. Screener copies for awards consideration, rough cuts shared for notes, final deliverables sent to distributors — every handoff is a complete copy that can be copied, screenshotted, or exfiltrated.

The Old Way

Post Assets Source content Full Copy to Facility Edit / Color / Sound Complete content access Every facility, full copy LEAKED Complete content exposed
Section 02

The PRIVATE.ME Solution

xBrief splits post-production assets into XorIDA threshold shares distributed across facilities so no single facility holds complete content. Each house works on their assigned shares — editorial, color, and sound remain isolated.

The editor works with editorial shares, the colorist with color shares, the sound designer with audio shares. Each facility has enough information to perform their specific task, but no facility can reconstruct the complete deliverable. Final assembly requires threshold reconstruction with multi-party authorization.

This eliminates the 'complete copy at every facility' problem. A breach at the color house reveals color shares — mathematically worthless without the editorial and sound shares. The attack surface shrinks from 'every facility has everything' to 'no facility has anything complete.'

The New Way

Post Assets Source content XorIDA Split K-of-N shares Editorial Share 1 Color Share 2 Sound Share N Final Assembly Threshold K
Section 03

How It Works

xBrief integrates XorIDA threshold splitting into post-production workflows with per-asset HMAC integrity, facility-scoped distribution, and threshold reconstruction for final delivery.

Ingest Validate XorIDA Split K-of-N Facility Dist Multi-house HMAC Verify Per-asset Reconstruct Threshold Deliver
Key Security Properties
Each facility receives only the shares relevant to their discipline. Per-asset HMAC-SHA256 ensures no share has been tampered with during the workflow. Final assembly requires threshold quorum plus producer authorization via xLock push-auth. Version control tracks every share modification.
Section 04

Use Cases

✂️
Editorial
Multi-House Editing

Split picture-locked footage across editorial houses so no single editor has the complete film.

Editorial
🎨
Color
Remote Color Grading

Send color shares to grading facilities without exposing complete frames.

Color
🎵
Sound
Sound Mix Distribution

Split dialogue, music, and effects stems across sound houses.

Sound
📦
Delivery
Final Deliverable Assembly

Threshold reconstruction for final master with multi-party sign-off.

Delivery
Section 05

Integration

Quick Start
import { splitAsset, assignFacility } from '@private.me/xbrief';

// Split post-production asset across 3 facilities
const shares = await splitAsset({
  content: assetBuffer,
  threshold: { k: 2, n: 3 },
  facilities: ['editorial', 'color', 'sound']
});
// Each facility gets only their discipline's shares
await assignFacility(shares, 'color', { scope: 'grading' });
splitAsset(opts: AssetOpts): Promise<Result<FacilityShares[], SplitError>>
Splits post-production assets into k-of-n XorIDA threshold shares with facility-scoped distribution, per-asset HMAC integrity, and version tracking. Returns facility-assigned share bundles for collaborative workflows.
Section 06

Security Properties

PropertyMechanismGuarantee
Asset ProtectionXorIDA k-of-n split Information-theoretic
Asset IntegrityHMAC-SHA256 per-asset Tamper-evident
Facility ScopeShare-level access control Zero-knowledge per-facility
Assembly AuthxLock multi-party approval Threshold sign-off
$9.1B
Content protection market
<1ms
Split latency
k-of-n
Threshold
VERIFIED BY XPROVE

Verifiable Data Protection

Every operation in this ACI produces a verifiable audit trail via xProve. HMAC-chained integrity proofs let auditors confirm that data was split, stored, and reconstructed correctly — without accessing the data itself.

XPROVE AUDIT TRAIL
Every XorIDA split generates HMAC-SHA256 integrity tags. xProve chains these into a tamper-evident audit trail that proves data was handled correctly at every step. Upgrade to zero-knowledge proofs when regulators or counterparties need public verification.

Read the xProve white paper →
GET STARTED

Ready to deploy xBrief?

Talk to Ren, our AI sales engineer, or book a live demo with our team.

Book a Demo

© 2026 StandardClouds Inc. dba PRIVATE.ME. All rights reserved.

VERIFIABLE WITHOUT CODE EXPOSURE

Ship Proofs, Not Source

xBrief generates cryptographic proofs of correct execution without exposing proprietary algorithms. Verify integrity using zero-knowledge proofs — no source code required.

XPROVE CRYPTOGRAPHIC PROOF
Download proofs:

Verify proofs online →

Use Cases

🏛️
REGULATORY
FDA / SEC Submissions
Prove algorithm correctness for distributed systems without exposing trade secrets or IP.
Zero IP Exposure
🏦
FINANCIAL
Audit Without Access
External auditors verify secure operations without accessing source code or production systems.
FINRA / SOX Compliant
🛡️
DEFENSE
Classified Verification
Security clearance holders verify distributed systems correctness without clearance for source code.
CMMC / NIST Ready
🏢
ENTERPRISE
Procurement Due Diligence
Prove security + correctness during RFP evaluation without NDA or code escrow.
No NDA Required

Deployment Options

📦

SDK Integration

Embed directly in your application. Runs in your codebase with full programmatic control.

  • npm install @private.me/xbrief
  • TypeScript/JavaScript SDK
  • Full source access
  • Enterprise support available
Get Started →
🏢

On-Premise Upon Request

Enterprise CLI for compliance, air-gap, or data residency requirements.

  • Complete data sovereignty
  • Air-gap capable deployment
  • Custom SLA + dedicated support
  • Professional services included
Request Quote →

Enterprise On-Premise Deployment

While xBrief is primarily delivered as SaaS or SDK, we build dedicated on-premise infrastructure for customers with:

  • Regulatory mandates — HIPAA, SOX, FedRAMP, CMMC requiring self-hosted processing
  • Air-gapped environments — SCIF, classified networks, offline operations
  • Data residency requirements — EU GDPR, China data laws, government mandates
  • Custom integration needs — Embed in proprietary platforms, specialized workflows

Includes: Enterprise CLI, Docker/Kubernetes orchestration, RBAC, audit logging, and dedicated support.

Contact sales for assessment and pricing →