xRoom: Split-Channel Virtual Data Room
M&A virtual data room with XorIDA split-channel document access. Bidders see only what they are authorized to see, enforced cryptographically.
The Problem
M&A virtual data rooms store the most sensitive corporate documents in a single location, protected only by access controls that can be bypassed by insiders or breaches.
VDRs contain financial statements, IP documentation, customer lists, and strategic plans. A single breach or insider leak during a deal process can destroy billions in enterprise value.
Traditional VDR security relies on access control lists and watermarking. Neither prevents a determined insider from exfiltrating complete documents.
The Old Way
The PRIVATE.ME Solution
xRoom uses XorIDA to split VDR documents so no single storage location or participant holds complete files. Access is enforced cryptographically via threshold reconstruction and DID-scoped permissions.
Documents are XorIDA-split at upload. Bidder access is controlled via DID-scoped permissions in the Trust Registry. Viewing requires threshold reconstruction, and each reconstruction is logged in an HMAC-chained audit trail.
Deal stages gate document availability: preliminary info (stage 1), detailed diligence (stage 2), final documentation (stage 3). Stage transitions require threshold authorization from deal principals.
The New Way
How It Works
xRoom provides a split-storage VDR with DID-scoped access, threshold reconstruction, and stage-gated document release.
Use Cases
Split-store M&A documents so no single breach exposes deal-sensitive information.
M&AStage-gated access with cryptographic enforcement for due diligence documents.
DiligenceHMAC-chained log of every document view for regulatory compliance.
AuditCryptographic access control prevents insider exfiltration of complete documents.
InsiderIntegration
import { SplitVDR } from '@private.me/vdrsplit'; const vdr = await SplitVDR.create({ dealDid: dealDid, stages: ['preliminary', 'diligence', 'final'], threshold: { k: 2, n: 3 } }); await vdr.uploadDocument(doc, { stage: 'diligence' });
Security Properties
| Property | Mechanism | Guarantee |
|---|---|---|
| Storage | XorIDA K-of-N split | ✓ Information-theoretic |
| Access | DID-scoped permissions | ✓ Cryptographic enforcement |
| Stages | Threshold-gated release | ✓ Multi-party authorization |
| Audit | HMAC-chained log | ✓ Per-view tracking |
Verifiable Data Protection
Every operation in this ACI produces a verifiable audit trail via xProve. HMAC-chained integrity proofs let auditors confirm that data was split, stored, and reconstructed correctly — without accessing the data itself.
Read the xProve white paper →
Ready to deploy xRoom?
Talk to Ren, our AI sales engineer, or book a live demo with our team.
Ship Proofs, Not Source
xRoom generates cryptographic proofs of correct execution without exposing proprietary algorithms. Verify integrity using zero-knowledge proofs — no source code required.
- Tier 1 HMAC (~0.7KB)
- Tier 2 Commit-Reveal (~0.5KB)
- Tier 3 IT-MAC (~0.3KB)
- Tier 4 KKW ZK (~0.4KB)
Use Cases
Deployment Options
SaaS Recommended
Fully managed infrastructure. Call our REST API, we handle scaling, updates, and operations.
- Zero infrastructure setup
- Automatic updates
- 99.9% uptime SLA
- Enterprise SLA available
SDK Integration
Embed directly in your application. Runs in your codebase with full programmatic control.
npm install @private.me/xroom- TypeScript/JavaScript SDK
- Full source access
- Enterprise support available
On-Premise Upon Request
Enterprise CLI for compliance, air-gap, or data residency requirements.
- Complete data sovereignty
- Air-gap capable deployment
- Custom SLA + dedicated support
- Professional services included
Enterprise On-Premise Deployment
While xRoom is primarily delivered as SaaS or SDK, we build dedicated on-premise infrastructure for customers with:
- Regulatory mandates — HIPAA, SOX, FedRAMP, CMMC requiring self-hosted processing
- Air-gapped environments — SCIF, classified networks, offline operations
- Data residency requirements — EU GDPR, China data laws, government mandates
- Custom integration needs — Embed in proprietary platforms, specialized workflows
Includes: Enterprise CLI, Docker/Kubernetes orchestration, RBAC, audit logging, and dedicated support.