xSurveillance: CAT/MiFIR Trade Surveillance Data Protection
Protect consolidated audit trail and MiFIR surveillance data with XorIDA threshold sharing. Regulators verify without centralized data exposure.
The Problem
Consolidated Audit Trail (CAT) and MiFIR surveillance requirements force market participants to report detailed trade data to central repositories, creating massive honeypot targets.
CAT collects billions of trade events containing customer PII, order flow, and trading strategies. A breach exposes the entire market's activity. The 2024 CAT NMS data breach demonstrated this risk.
MiFIR transaction reporting requires similar centralization in EU markets. Both create single points of failure that are high-value targets for nation-state actors and financial criminals.
The Old Way
The PRIVATE.ME Solution
xSurveillance splits surveillance data into XorIDA shares distributed across independent custodians. Regulatory verification requires threshold reconstruction, preventing single-point breaches.
Trade reports are HMAC-signed at submission, then XorIDA-split across independent storage nodes. Regulators query by reconstructing specific records via threshold quorum. Bulk data never exists in one place.
Real-time surveillance analytics run on shares via xCompute for pattern detection. Suspicious activity triggers targeted reconstruction only for flagged records.
The New Way
How It Works
xSurveillance provides split-storage for surveillance data with threshold-based regulatory access and xCompute-powered real-time analytics on shares.
Use Cases
Split consolidated audit trail data so no single breach exposes all trade records.
CATProtect MiFIR transaction reports with threshold-based regulatory access.
MiFIRRun surveillance analytics on XorIDA shares without centralizing trade data.
AnalyticsA single custodian breach exposes zero reconstructable trade records.
SecurityIntegration
import { SurveillanceVault } from '@private.me/xsurveillance'; const vault = await SurveillanceVault.create({ custodians: [custA, custB, custC], threshold: { k: 2, n: 3 } }); await vault.submit(tradeReport);
Security Properties
| Property | Mechanism | Guarantee |
|---|---|---|
| Data at rest | XorIDA K-of-N split | ✓ Information-theoretic |
| Regulatory access | Threshold reconstruction | ✓ Targeted queries only |
| Integrity | HMAC-SHA256 per-report | ✓ Tamper detection |
| Analytics | xCompute on shares | ✓ No centralized data |
Verifiable Data Protection
Every operation in this ACI produces a verifiable audit trail via xProve. HMAC-chained integrity proofs let auditors confirm that data was split, stored, and reconstructed correctly — without accessing the data itself.
Read the xProve white paper →
Ready to deploy xSurveillance?
Talk to Sol, our AI sales engineer, or book a live demo with our team.
Ship Proofs, Not Source
xSurveillance generates cryptographic proofs of correct execution without exposing proprietary algorithms. Verify integrity using zero-knowledge proofs — no source code required.
- Tier 1 HMAC (~0.7KB)
- Tier 2 Commit-Reveal (~0.5KB)
- Tier 3 IT-MAC (~0.3KB)
- Tier 4 KKW ZK (~0.4KB)
Use Cases
Deployment Options
SaaS Recommended
Fully managed infrastructure. Call our REST API, we handle scaling, updates, and operations.
- Zero infrastructure setup
- Automatic updates
- 99.9% uptime SLA
- Enterprise SLA available
SDK Integration
Embed directly in your application. Runs in your codebase with full programmatic control.
npm install @private.me/xsurveillance- TypeScript/JavaScript SDK
- Full source access
- Enterprise support available
On-Premise Upon Request
Enterprise CLI for compliance, air-gap, or data residency requirements.
- Complete data sovereignty
- Air-gap capable deployment
- Custom SLA + dedicated support
- Professional services included
Enterprise On-Premise Deployment
While xSurveillance is primarily delivered as SaaS or SDK, we build dedicated on-premise infrastructure for customers with:
- Regulatory mandates — HIPAA, SOX, FedRAMP, CMMC requiring self-hosted processing
- Air-gapped environments — SCIF, classified networks, offline operations
- Data residency requirements — EU GDPR, China data laws, government mandates
- Custom integration needs — Embed in proprietary platforms, specialized workflows
Includes: Enterprise CLI, Docker/Kubernetes orchestration, RBAC, audit logging, and dedicated support.