Network Privacy Through Hardware
Run your application on Phala Cloud without trusting us to keep your data private—the hardware guarantees it. Intel TDX encrypts your application’s memory with keys that never leave the CPU. The host OS cannot decrypt your data because the hardware prevents it. When clients connect to your application, traffic passes through multiple layers of encryption. Each layer protects against different attacks. You can verify all of this through cryptographic attestation.How It Works: The Big Picture
Your application runs inside a Confidential VM (CVM). When clients connect, their requests flow through a gateway that’s also hardware-protected: Both the gateway and your CVM run inside Intel TDX Trusted Execution Environments. The infrastructure operator cannot access their memory or keys because the hardware prevents it. Before any connection is established, the gateway and your CVM verify each other through cryptographic attestation. This ensures you’re always connecting to genuine TEE instances, not imposters. TLS certificate private keys are generated inside the TEE and never leave. The keys get sealed to specific hardware measurements, so only verified TEE instances can use them. DNS security records lock your domain to the TEE’s certificate account, preventing unauthorized certificate issuance. For network topology and routing details, see Architecture.Security Model
What We Protect Against
Compromised host OS: Hardware encrypts your CVM’s memory with keys the host cannot access. Even with root access, attackers cannot read your application’s memory or network traffic. Malicious infrastructure operator: The gateway runs in its own TEE. Even with full infrastructure access, the operator cannot access the gateway’s memory, keys, or decrypt your traffic. Both gateway and CVM verify each other before establishing connections. Certificate compromise: Certificate private keys are generated inside TEEs and cryptographically bound to hardware measurements. DNS security records prevent unauthorized certificate issuance. Even a compromised certificate authority cannot issue valid certificates without TEE control. Certificate misissuance: Public certificate transparency logs track all certificate issuance. Combined with DNS security records, this provides detection and prevention of unauthorized certificates.What You Need to Trust
The security model shifts trust from people and organizations to hardware and verifiable code. You don’t need to trust the infrastructure. The gateway operator can’t access gateway memory, keys, or traffic because the gateway runs in its own TEE. Other CVMs on the same host can’t reach your data due to hardware-enforced isolation. Even the host operating system can’t inspect your memory because TEE protection prevents it. Infrastructure providers have no access that can compromise TEEs. You still need to trust three things. First, your own application code—application vulnerabilities are your responsibility. Second, the TDX hardware security itself, as Intel’s hardware implementation forms the root of trust. Third, the certificate authorities like Let’s Encrypt must be trustworthy, though this risk is mitigated by CAA records and CT monitoring.Out of Scope
Application security: Network security doesn’t protect against application vulnerabilities. Your code must handle input validation, authentication, and authorization correctly. Availability attacks: DDoS protection and high availability are not guaranteed. Design your applications with redundancy and rate limiting as needed. Side-channel attacks: Advanced timing attacks or speculative execution vulnerabilities may leak information. Follow secure coding practices and keep software updated.Gateway Security Architecture
The gateway routes traffic between clients and your CVM while maintaining zero-trust security. Understanding how the gateway works helps explain why even infrastructure operators can’t compromise your connections.Gateway TEE Protection
The gateway itself runs inside an Intel TDX Confidential VM:- Operator cannot access TLS keys or decrypt traffic
- Gateway code is verifiable through attestation
- All certificate operations happen inside the TEE
Mutual Attestation Protocol
Before any traffic flows, the gateway and your CVM verify each other. This prevents man-in-the-middle attacks and ensures both sides are genuine TEE instances running verified code:- Attestation First: Both the gateway TEE and your CVM generate TDX attestation quotes
- Mutual Verification: Each side verifies the other’s attestation before proceeding
- Key Exchange: Only after successful attestation do they exchange tunnel keys
- Tunnel Creation: An encrypted tunnel is established using ChaCha20-Poly1305
- Continuous Encryption: All traffic flows through this attested tunnel, invisible to the host
Zero-Trust HTTPS (zt-https)
TLS certificate private keys are generated inside TEEs and never leave. The keys stay sealed to hardware measurements. Only verified TEE instances can use them. This means certificate private keys remain under TEE control at all times.How TEEs Control Certificates
Both Phala Cloud gateway domains (via gateway) and custom domains (via dstack-ingress) implement Zero-Trust HTTPS:- TEE generates ECDSA keypair: The private key is created inside TDX-encrypted memory and never leaves the TEE
- Registers with Let’s Encrypt: The TEE establishes its own certificate account using the key
- Seals credentials to hardware: Keys are bound to specific TEE measurements, so only this exact TEE configuration can use them
- Requests certificates: Certificate operations happen entirely inside the TEE
Certificate Architecture
Zero-Trust HTTPS uses three mechanisms to prevent unauthorized certificate issuance: CAA DNS Records: Lock your domain to a specific ACME account/evidences/ containing:
- TDX attestation quote proving hardware backing
- SHA256 hash linking the certificate to the ACME account
- The actual certificate and account details
Preventing Timeline Attacks
CAA records only protect future certificate issuance. Existing certificates remain valid until expiration. To ensure complete security:- Check historical certificates: Review all certificates ever issued for your domain
- Verify expiration: Ensure pre-deployment certificates have expired
- Revoke if necessary: Contact the CA to revoke any unexpired legacy certificates
Verification Procedures
For step-by-step instructions on verifying certificate control and attestation:- Gateway domains (
*.phala.network): See Domain Attestation: Gateway Domains - Custom domains: See Domain Attestation: Custom Domains
Advanced Privacy with Tor
Tor adds an additional layer of network-level anonymity on top of TEE protection. Need network-layer anonymity? Deploy Tor inside your CVM:Compliance and Standards
Hardware-enforced security helps meet regulatory requirements. TEE isolation, encryption at rest and in transit, and cryptographic attestation provide technical controls for GDPR Article 32, HIPAA technical safeguards, and PCI DSS network segmentation. The infrastructure provides several compliance-relevant protections:- Memory encryption (TLS 1.3, WireGuard, TDX)
- Hardware isolation between tenants
- Cryptographic audit trails via attestation
- FIPS-approved cryptography
- Secure coding practices
- Authentication and authorization logic
- Data retention and deletion policies

