xWatt: Solar Inverter & DER Grid Security
Secure solar inverters and distributed energy resources with xBoot firmware integrity, xLink M2M authentication, and threshold authorization for grid commands.
The Problem
Solar inverters and DER controllers have 46+ known CVEs and minimal security. A coordinated attack on inverters could destabilize the power grid.
The Department of Energy warns that internet-connected solar inverters are a critical infrastructure vulnerability. Researchers have demonstrated that compromising enough inverters simultaneously could cause grid instability or blackouts.
Current inverter firmware ships unsigned. Remote management protocols use shared credentials. There are zero established security frameworks specific to DER devices.
The Old Way
The PRIVATE.ME Solution
xWatt secures DER devices with xBoot firmware integrity (triple verification), xLink DID authentication (per-device identity), and threshold authorization for grid control commands.
Every inverter and DER controller receives a unique DID identity via xLink. Firmware updates are delivered via xBoot: XorIDA-split at deploy, reconstructed in memory, triple-verified (HMAC + Ed25519 manifest + per-file SHA-256).
Grid control commands require threshold authorization: K-of-N utility operators must approve before any command executes. This prevents a single compromised operator from issuing destabilizing commands.
The New Way
How It Works
xWatt combines xBoot (firmware integrity), xLink (device identity), and threshold authorization (grid command approval) into a comprehensive DER security layer.
Use Cases
Secure solar inverters with per-device identity and verified firmware.
SolarThreshold authorization for DER grid control commands.
GridxBoot triple-verified firmware updates for DER devices.
FirmwareDID-authenticated SCADA communication for distributed energy resources.
SCADAIntegration
import { DERGuard } from '@private.me/gridsplit'; const guard = await DERGuard.create({ deviceDid: inverterDid, gridOperators: [opA, opB, opC], commandThreshold: { k: 2, n: 3 } });
Security Properties
| Property | Mechanism | Guarantee |
|---|---|---|
| Device identity | DID per-inverter | ✓ Ed25519 unique |
| Firmware | xBoot triple verify | ✓ HMAC + Ed25519 + SHA-256 |
| Commands | Threshold K-of-N | ✓ Multi-operator approval |
| Communication | xLink M2M | ✓ Encrypted authenticated |
Verifiable Data Protection
Every operation in this ACI produces a verifiable audit trail via xProve. HMAC-chained integrity proofs let auditors confirm that data was split, stored, and reconstructed correctly — without accessing the data itself.
Read the xProve white paper →
Ready to deploy xWatt?
Talk to Ren, our AI sales engineer, or book a live demo with our team.
Deployment Options
SaaS Recommended
Fully managed infrastructure. Call our REST API, we handle scaling, updates, and operations.
- Zero infrastructure setup
- Automatic updates
- 99.9% uptime SLA
- Enterprise SLA available
SDK Integration
Embed directly in your application. Runs in your codebase with full programmatic control.
npm install @private.me/xwatt- TypeScript/JavaScript SDK
- Full source access
- Enterprise support available
On-Premise Upon Request
Enterprise CLI for compliance, air-gap, or data residency requirements.
- Complete data sovereignty
- Air-gap capable deployment
- Custom SLA + dedicated support
- Professional services included
Enterprise On-Premise Deployment
While xWatt is primarily delivered as SaaS or SDK, we build dedicated on-premise infrastructure for customers with:
- Regulatory mandates — HIPAA, SOX, FedRAMP, CMMC requiring self-hosted processing
- Air-gapped environments — SCIF, classified networks, offline operations
- Data residency requirements — EU GDPR, China data laws, government mandates
- Custom integration needs — Embed in proprietary platforms, specialized workflows
Includes: Enterprise CLI, Docker/Kubernetes orchestration, RBAC, audit logging, and dedicated support.
Ship Proofs, Not Source
xWatt generates cryptographic proofs of correct execution without exposing proprietary algorithms. Verify integrity using zero-knowledge proofs — no source code required.
- Tier 1 HMAC (~0.7KB)
- Tier 2 Commit-Reveal (~0.5KB)
- Tier 3 IT-MAC (~0.3KB)
- Tier 4 KKW ZK (~0.4KB)