Complete Network Privacy Through Hardware
Phala Cloud runs your applications in hardware-encrypted memory where even the cloud provider can’t see your data. Every network connection uses multiple layers of encryption, and you can verify it all cryptographically.Security Architecture
Defense in Depth
Phala Cloud implements multiple independent security layers. Each layer assumes others might fail, creating resilient protection: Hardware encryption. Intel TDX encrypts memory with unique per-VM keys. The hypervisor and host OS cannot access these keys—the hardware prevents it. Network isolation. Every packet travels through encrypted tunnels. TLS 1.3 protects client connections, then WireGuard isolates CVM traffic from the host network. Certificate security. TEEs generate ACME accounts inside encrypted memory. Private keys exist nowhere else—they’re mathematically bound to the TEE instance.Application Responsibility
Your code, your security. We protect the infrastructure layer. Application vulnerabilities like SQL injection or authentication bugs remain your responsibility. Think of us as an armored truck: we secure the transport, not what you put inside.Network Architecture
Hardware Isolation
Your application runs in a Confidential VM (CVM) protected by Intel TDX. Here’s the architecture:Traffic Flow
Standard HTTPS traffic follows this path:s suffix to your domain (like app-443s.phala.network) and the gateway routes without decryption. Your application handles TLS termination directly.
WireGuard with Mutual Attestation
WireGuard tunnels between the gateway and your CVM are only established after mutual attestation:- Attestation First: Both the gateway TEE and your CVM generate TDX attestation quotes
- Mutual Verification: Each side verifies the other’s attestation before proceeding
- Key Exchange: Only after successful attestation do they exchange WireGuard public keys
- Tunnel Creation: WireGuard establishes the encrypted tunnel using ChaCha20-Poly1305
- Continuous Encryption: All traffic flows through this attested tunnel, invisible to the host
Zero-Trust HTTPS (zt-https)
How TEEs Control Certificates
Both Phala Cloud domains (via gateway) and custom domains (via dstack-ingress) implement Zero-Trust HTTPS. TEEs generate and control their own ACME accounts:- TEE generates ECDSA keypair: The private key is created inside TDX-encrypted memory
- Registers with Let’s Encrypt: The TEE establishes its own ACME account
- Seals credentials to hardware: Keys are stored on encrypted disk, bound to TEE measurements
- Requests certificates: Only this specific TEE instance can use these credentials
Zero-Trust Certificate Architecture
We implement Zero-Trust HTTPS through three essential mechanisms: CAA DNS Records: Lock your domain to a specific ACME account/evidences/ containing:
- TDX attestation quote proving hardware backing
- SHA256 hash linking the certificate to the ACME account
- The actual certificate and account details
Preventing Timeline Attacks
CAA records only protect future certificate issuance. Existing certificates remain valid until expiration. To ensure complete security:- Check historical certificates: Review all certificates ever issued for your domain
- Verify expiration: Ensure pre-deployment certificates have expired
- Revoke if necessary: Contact the CA to revoke any unexpired legacy certificates
Compliance and Standards
Phala Cloud’s architecture aligns with major regulatory requirements through hardware-enforced security. The platform provides GDPR Article 32 compliance with state-of-the-art encryption (TLS 1.3, WireGuard, TDX), pseudonymization through CVM isolation, and continuous confidentiality. For HIPAA, we deliver hardware-enforced access controls, attestation-based audit trails, and mandatory end-to-end encryption. PCI DSS requirements are met through hardware network segmentation, FIPS-approved cryptography, and hardware-sealed key management. Remember: infrastructure security doesn’t replace application security. You remain responsible for secure coding practices, authentication, and application-layer compliance requirements.Advanced Deployment Patterns
Cross-Region Architecture
Running globally distributed CVMs? Traffic flows like this:Maximum Privacy with Tor
Need network-layer anonymity? Deploy Tor inside your CVM:TLS Passthrough Applications
For services requiring unmodified TLS:s suffix enables passthrough mode. Common uses include gRPC services, custom protocols, and applications with client certificate authentication.

