Loading...
private.me Docs
Get xNuke
PRIVATE.ME PLATFORM

xNuke: Nuclear Facility Monitoring

XorIDA splits nuclear sensor readings across independent international agencies, guaranteeing no single agency can falsify safety data or suppress critical alerts.

Government COMING SOON XorIDA Powered
Section 01

The Problem

Nuclear sensor data integrity relies on trust in single monitoring agencies. A compromised or politically pressured agency can suppress safety alerts, falsify readings, or delay critical warnings.

The International Atomic Energy Agency (IAEA) and national regulators depend on sensor networks that report through single organizational channels. Reactor temperature, radiation levels, coolant flow rates, and containment pressure readings all pass through a single chain of custody before reaching decision-makers.

This architecture has a fundamental weakness: a compromised monitoring agency — whether through state pressure, insider threat, or cyberattack — can alter readings to mask dangerous conditions. The Fukushima and Chernobyl incidents demonstrated that institutional trust in monitoring data is insufficient when lives are at stake.

The Old Way

REACTOR SENSORS SINGLE MONITORING AGENCY FALSIFIED DATA REGULATORS Single point of falsification
Section 02

The PRIVATE.ME Solution

XorIDA splits every sensor reading across independent international agencies. Threshold reconstruction guarantees that no single agency — regardless of political pressure — can fabricate a valid reading.

Each sensor reading is split into N shares using XorIDA threshold sharing. Shares are distributed to independent, geographically diverse agencies — IAEA, national regulators, and independent watchdogs. Any K of N shares reconstruct the original reading. Fewer than K shares reveal nothing.

To falsify a reading, an adversary would need to simultaneously compromise K independent agencies across multiple jurisdictions — a vastly harder attack than compromising a single organization. Every share carries HMAC-SHA256 integrity verification, making even single-bit tampering detectable.

The New Way

REACTOR SENSORS XorIDA SPLIT AGENCY A (IAEA) AGENCY B (National) AGENCY C (Watchdog) VERIFIED READING
Section 03

How It Works

A four-stage pipeline: sensor ingestion, XorIDA split with typed integrity metadata, multi-agency distribution, and HMAC-verified threshold reconstruction.

1. INGEST Sensor Reading 2. SPLIT XorIDA K-of-N 3. DISTRIBUTE N Agencies 4. VERIFY HMAC + Reconstruct SENSOR METADATA Each reading tagged with reactor ID, sensor type (temp, pressure, radiation), timestamp (NTP-synced), and calibration hash. HMAC covers both metadata and reading payload for full integrity. INTEGRITY ALERTS Typed alert system: TAMPER_DETECTED, SHARE_MISSING, THRESHOLD_DEGRADED, AGENCY_OFFLINE. Each alert includes affected agency ID, share index, and expected vs. received HMAC values.
Key Security Properties
Multi-jurisdictional trust: No single nation-state or agency can unilaterally alter safety data. Falsification requires compromising K independent agencies across different legal jurisdictions.

Tamper evidence: Every share carries HMAC-SHA256. Altered readings fail verification immediately, triggering typed TAMPER_DETECTED alerts to all participating agencies.

Fail-safe availability: If N-K agencies go offline, the system still produces verified readings from the remaining K agencies.
Section 04

Use Cases

International
IAEA Inspections

Split inspection sensor data across IAEA, host country regulator, and independent observer. No single party can suppress findings. Threshold reconstruction requires multinational cooperation.

Treaty Compliance
🌡
Safety
Reactor Safety Monitoring

Continuous reactor temperature, pressure, and coolant flow readings split across independent safety organizations. Anomalies detected even if one monitoring body is compromised.

Real-Time Monitoring
📊
Environmental
Radiation Environmental Monitoring

Environmental radiation sensors around nuclear facilities report through split channels. Communities, regulators, and operators each hold shares — no single party controls the narrative.

Environmental Safety
🤝
Diplomacy
Treaty Verification

Arms control treaty verification data split across signatory nations. Each nation holds shares; treaty compliance is verifiable only through multinational threshold cooperation.

Arms Control
Section 05

Integration

Quick Start
import { splitReading, verifyIntegrity } from '@private.me/xnuke';

// Split sensor reading across 3 agencies (2-of-3)
const shares = await splitReading(
  sensorReading,
  ['iaea', 'national-regulator', 'independent-watchdog'],
  { n: 3, k: 2 }
);

// Verify integrity at reconstruction point
const result = await verifyIntegrity(collectedShares);
if (result.ok) {
  // result.value contains the verified sensor reading
  processReading(result.value);
}
splitReading(sensor: SensorReading, agencies: string[], config: { n: number, k: number }): Promise<NuclearShare[]>
Splits a sensor reading into N shares using XorIDA threshold sharing. Each share is tagged with agency ID, sensor type, timestamp, and HMAC-SHA256. Returns an array of NuclearShare objects for distribution to independent agencies.
verifyIntegrity(shares: NuclearShare[]): Promise<Result<SensorReading, IntegrityAlert>>
Verifies HMAC integrity of each share, reconstructs the original sensor reading from K-of-N verified shares. Returns typed IntegrityAlert on failure with alert type, affected agency, and expected vs. received HMAC.
Section 06

Security Properties

PropertyMechanismGuarantee
ConfidentialityXorIDA K-of-N thresholdInformation-theoretic (unconditional)
IntegrityHMAC-SHA256 per shareTamper detection before reconstruction
Non-FalsificationMulti-agency thresholdRequires K compromised agencies
AvailabilityN-K redundancyTolerates N-K agency failures
AccountabilityTyped integrity alertsTamper traced to specific agency
<1ms
Typical payload
2-of-3
Default threshold
0 bits
Leaked from K-1 shares
256-bit
HMAC integrity tag
VERIFIED BY XPROVE

Verifiable Data Protection

Every operation in this ACI produces a verifiable audit trail via xProve. HMAC-chained integrity proofs let auditors confirm that data was split, stored, and reconstructed correctly — without accessing the data itself.

XPROVE AUDIT TRAIL
Every XorIDA split generates HMAC-SHA256 integrity tags. xProve chains these into a tamper-evident audit trail that proves data was handled correctly at every step. Upgrade to zero-knowledge proofs when regulators or counterparties need public verification.

Read the xProve white paper →
GET STARTED

Ready to deploy xNuke?

Talk to Ren, our AI sales engineer, or book a live demo with our team.

Book a Demo

© 2026 StandardClouds Inc. dba PRIVATE.ME. All rights reserved.

VERIFIABLE WITHOUT CODE EXPOSURE

Ship Proofs, Not Source

xNuke generates cryptographic proofs of correct execution without exposing proprietary algorithms. Verify integrity using zero-knowledge proofs — no source code required.

XPROVE CRYPTOGRAPHIC PROOF
Download proofs:

Verify proofs online →

Use Cases

🏛️
REGULATORY
FDA / SEC Submissions
Prove algorithm correctness for distributed systems without exposing trade secrets or IP.
Zero IP Exposure
🏦
FINANCIAL
Audit Without Access
External auditors verify secure operations without accessing source code or production systems.
FINRA / SOX Compliant
🛡️
DEFENSE
Classified Verification
Security clearance holders verify distributed systems correctness without clearance for source code.
CMMC / NIST Ready
🏢
ENTERPRISE
Procurement Due Diligence
Prove security + correctness during RFP evaluation without NDA or code escrow.
No NDA Required

Deployment Options

📦

SDK Integration

Embed directly in your application. Runs in your codebase with full programmatic control.

  • npm install @private.me/xnuke
  • TypeScript/JavaScript SDK
  • Full source access
  • Enterprise support available
Get Started →
🏢

On-Premise Upon Request

Enterprise CLI for compliance, air-gap, or data residency requirements.

  • Complete data sovereignty
  • Air-gap capable deployment
  • Custom SLA + dedicated support
  • Professional services included
Request Quote →

Enterprise On-Premise Deployment

While xNuke is primarily delivered as SaaS or SDK, we build dedicated on-premise infrastructure for customers with:

  • Regulatory mandates — HIPAA, SOX, FedRAMP, CMMC requiring self-hosted processing
  • Air-gapped environments — SCIF, classified networks, offline operations
  • Data residency requirements — EU GDPR, China data laws, government mandates
  • Custom integration needs — Embed in proprietary platforms, specialized workflows

Includes: Enterprise CLI, Docker/Kubernetes orchestration, RBAC, audit logging, and dedicated support.

Contact sales for assessment and pricing →