Loading...
private.me Docs
Get xLedger
PRIVATE.ME PLATFORM

xLedger: Immutable AI Decision Audit Trail

HMAC-chained, DID-signed audit log for AI decisions. Every inference, recommendation, and action is recorded in a tamper-evident chain for regulatory compliance.

AI/ML COMING SOON XorIDA Powered
Section 01

The Problem

AI systems make high-stakes decisions affecting loans, hiring, medical diagnosis, and criminal justice, but audit trails are easily tampered with or deleted.

Regulators require explainable AI with complete decision records. Traditional database logs can be altered by administrators. There is no cryptographic guarantee that the audit trail reflects reality.

The EU AI Act mandates that high-risk AI systems maintain tamper-evident logs of every decision. Non-compliance carries fines up to 7% of global revenue.

The Old Way

AI Model / Agent Single trust boundary Unprotected SINGLE PROVIDER Full data access Single point of failure BREACH 100% data exposed
Section 02

The PRIVATE.ME Solution

xLedger creates an HMAC-chained, DID-signed decision log where every AI decision is cryptographically linked to the previous entry. Tampering with any entry invalidates the chain.

Each decision record includes: input hash, model ID, output, confidence score, timestamp, and the signer’s DID. Records are HMAC-SHA256-chained so any modification invalidates all subsequent entries.

Decision logs can be XorIDA-split across independent custodians for additional tamper resistance. Verification requires only the chain of HMAC hashes, not the raw data.

The New Way

Data Input Agent / Model XorIDA Split K-of-N shares Node A Share 1 Node B Share 2 Node N Share N Reconstruct Threshold K
Section 03

How It Works

xLedger provides an append-only decision log with HMAC-SHA256 chaining, DID signatures, and optional XorIDA split-storage.

HMAC-Chained Hash-Linked Audit Trail

Each decision entry in xLedger is cryptographically linked to the previous entry using HMAC-SHA256, creating an immutable chain where any tampering is immediately detectable.

Chain Structure: Each entry contains the HMAC hash of the previous entry. Entry N includes HMAC(entryN-1) in its data, then computes HMAC(entryN) which is stored in Entry N+1. This creates a forward-linked chain where modifying any entry invalidates all subsequent entries.

Tamper Evidence: To verify the chain, start from the first entry and compute HMAC hashes forward. If any entry's hash doesn't match the next entry's stored hash, the chain is broken. An attacker who modifies Entry 50 cannot recompute the hashes for Entries 51-1000 without detection, because they don't have access to the HMAC key.

Per-Share Protection: When decision logs are XorIDA-split across multiple custodians, each share maintains its own HMAC chain. Tampering with a single custodian's share breaks that share's chain, making reconstruction impossible even if threshold shares are collected.

Audit Trail Properties
Append-Only: No deletions, no modifications. Only new entries can be added.
Hash-Linked: Each entry references the previous entry's HMAC hash.
DID-Signed: Each entry is signed by the AI model or agent's decentralized identifier.
Verifiable: Anyone with the HMAC key can verify chain integrity in O(n) time.
Tamper-Evident: Modifying any entry invalidates all subsequent entries.
Ingest Validate XorIDA Split K-of-N Distribute Multi-node HMAC Verify Per-share Reconstruct Threshold OK
Key Security Properties
HMAC-SHA256 chaining makes any tampering immediately detectable. DID signatures provide non-repudiation. Optional XorIDA split prevents single-custodian manipulation.
Section 04

Use Cases

📋
Compliance
EU AI Act Logging

Tamper-evident decision logs meeting EU AI Act requirements for high-risk systems.

Regulation
🏦
Finance
Lending Decisions

Cryptographic audit trail for AI-assisted loan approvals and denials.

Finance
🏥
Healthcare
Clinical AI Audit

Tamper-evident logs for AI-assisted diagnosis and treatment recommendations.

Healthcare
⚖️
Legal
Litigation Readiness

Cryptographically verifiable AI decision records for legal proceedings.

Legal
Section 05

Integration

Quick Start
import { DecisionLog } from '@private.me/decisionlog';

const log = DecisionLog.create({ signerDid: modelDid });
await log.record({
  input: inputHash,
  output: prediction,
  confidence: 0.94,
  model: 'risk-model-v3'
});
DecisionLog.create(opts): DecisionLog
Creates an HMAC-chained decision log. Each record is DID-signed and hash-linked to the previous entry.
Section 06

Security Properties

PropertyMechanismGuarantee
IntegrityHMAC-SHA256 chain Tamper-evident
AttributionDID signatures Non-repudiation
StorageOptional XorIDA split Multi-custodian
VerificationHash chain validation O(n) verify
$5.4B
AI audit TAM
HMAC
Chained log
DID
Signed entries
VERIFIED BY XPROVE

Verifiable Data Protection

Every operation in this ACI produces a verifiable audit trail via xProve. HMAC-chained integrity proofs let auditors confirm that data was split, stored, and reconstructed correctly — without accessing the data itself.

XPROVE AUDIT TRAIL
Every XorIDA split generates HMAC-SHA256 integrity tags. xProve chains these into a tamper-evident audit trail that proves data was handled correctly at every step. Upgrade to zero-knowledge proofs when regulators or counterparties need public verification.

Read the xProve white paper →
GET STARTED

Ready to deploy xLedger?

Talk to Ren, our AI sales engineer, or book a live demo with our team.

Book a Demo

© 2026 StandardClouds Inc. dba PRIVATE.ME. All rights reserved.

VERIFIABLE WITHOUT CODE EXPOSURE

Ship Proofs, Not Source

xLedger generates cryptographic proofs of correct execution without exposing proprietary algorithms. Verify integrity using zero-knowledge proofs — no source code required.

XPROVE CRYPTOGRAPHIC PROOF
Download proofs:

Verify proofs online →

Use Cases

🏛️
REGULATORY
FDA / SEC Submissions
Prove algorithm correctness for distributed systems without exposing trade secrets or IP.
Zero IP Exposure
🏦
FINANCIAL
Audit Without Access
External auditors verify secure operations without accessing source code or production systems.
FINRA / SOX Compliant
🛡️
DEFENSE
Classified Verification
Security clearance holders verify distributed systems correctness without clearance for source code.
CMMC / NIST Ready
🏢
ENTERPRISE
Procurement Due Diligence
Prove security + correctness during RFP evaluation without NDA or code escrow.
No NDA Required

Deployment Options

📦

SDK Integration

Embed directly in your application. Runs in your codebase with full programmatic control.

  • npm install @private.me/xledger
  • TypeScript/JavaScript SDK
  • Full source access
  • Enterprise support available
Get Started →
🏢

On-Premise Upon Request

Enterprise CLI for compliance, air-gap, or data residency requirements.

  • Complete data sovereignty
  • Air-gap capable deployment
  • Custom SLA + dedicated support
  • Professional services included
Request Quote →

Enterprise On-Premise Deployment

While xLedger is primarily delivered as SaaS or SDK, we build dedicated on-premise infrastructure for customers with:

  • Regulatory mandates — HIPAA, SOX, FedRAMP, CMMC requiring self-hosted processing
  • Air-gapped environments — SCIF, classified networks, offline operations
  • Data residency requirements — EU GDPR, China data laws, government mandates
  • Custom integration needs — Embed in proprietary platforms, specialized workflows

Includes: Enterprise CLI, Docker/Kubernetes orchestration, RBAC, audit logging, and dedicated support.

Contact sales for assessment and pricing →