Privacy is Our Core Mission
RedPill was built from the ground up with privacy as the foundation, not an afterthought. Every architectural decision prioritizes protecting your data with hardware-level security guarantees.Privacy Layers
Layer 1: TEE-Protected Gateway
The entire gateway infrastructure runs in Trusted Execution Environments: All pink nodes run inside TEE - your data never leaves hardware protection.Layer 2: Transport Encryption
- All connections use TLS 1.3
- Perfect forward secrecy (PFS)
- Strong cipher suites only
- Certificate pinning available
Layer 3: Memory Encryption
Inside TEE, all data is encrypted in memory:- AES-256 encryption
- CPU-enforced isolation
- No swapping to disk
- Secure deletion after processing
Layer 4: Confidential AI Models
Optional Phala models run entirely in GPU TEEs:- Model weights protected in TEE
- Inference in secure enclaves
- No model extraction possible
What We Protect
Your Prompts
All user messages and system prompts
Model Responses
Complete AI-generated responses
Function Calls
Function names and parameters
Embeddings
Input text for embeddings
Images
Vision model image data
Metadata
Custom metadata and headers
Privacy Guarantees
What RedPill CANNOT Access
Even with full system administrator access, RedPill operators cannot see:Data Type | Accessible to RedPill? | Protection |
---|---|---|
Prompt content | ❌ No | TEE-encrypted |
Response content | ❌ No | TEE-encrypted |
API keys | ❌ No (hashed) | Hashed with bcrypt |
Function parameters | ❌ No | TEE-encrypted |
Embedding inputs | ❌ No | TEE-encrypted |
Image data | ❌ No | TEE-encrypted |
Custom metadata | ❌ No | TEE-encrypted |
What RedPill CAN See
For operational and billing purposes only:Data Type | Purpose | Details |
---|---|---|
User ID | Account management | Hashed identifier |
Model selected | Billing | e.g., “gpt-4” |
Token count | Billing | Number only, not content |
Timestamp | Rate limiting | Request time |
Error codes | Debugging | No sensitive data |
IP address | Rate limiting | Hashed for privacy |
Data Retention
Data Type | Retention Period |
---|---|
Request content | 0 days - Never stored |
Response content | 0 days - Never stored |
Billing metadata | 90 days |
Error logs (no sensitive data) | 30 days |
Attestation reports | Available on request |
Threat Model
Threats We Protect Against
1. Malicious Cloud Provider
1. Malicious Cloud Provider
Threat: Cloud infrastructure provider tries to access your data.Protection: TEE ensures even the host OS cannot access enclave memory. Your data remains encrypted and inaccessible.
2. Compromised RedPill Operator
2. Compromised RedPill Operator
Threat: A rogue RedPill employee tries to steal data.Protection: Operators have zero access to TEE memory. Administrative access cannot decrypt TEE-protected data.
3. Server Breach
3. Server Breach
Threat: Attacker gains root access to RedPill servers.Protection: TEE isolation prevents root users from accessing enclave memory. Attestation proves genuine TEE execution.
4. Memory Dump Attack
4. Memory Dump Attack
Threat: Attacker tries to dump server memory to steal data.Protection: TEE memory is hardware-encrypted. Memory dumps show only encrypted data.
5. Supply Chain Attack
5. Supply Chain Attack
Threat: Malicious code injected into gateway software.Protection: Attestation includes code measurements. Modified code produces different attestation hash.
6. Man-in-the-Middle
6. Man-in-the-Middle
Threat: Network attacker intercepts traffic.Protection: TLS 1.3 with PFS encrypts all traffic. Certificate pinning prevents MITM.
Trust Assumptions
You must trust:- CPU Vendor (Intel, AMD, ARM) - TEE hardware correctness
- Cryptographic Algorithms - AES, RSA, ECDSA security
- Open Source Gateway Code - Auditable on GitHub
- ❌ RedPill operators
- ❌ Cloud infrastructure provider
- ❌ Operating system
- ❌ Other applications on the server
Compliance & Regulations
RedPill’s TEE architecture supports compliance with major regulations:HIPAA (Healthcare)
✅ Covered Entity Requirements:- Encryption at rest and in transit
- Access controls (TEE isolation)
- Audit logs
- Data integrity guarantees
- Available for healthcare customers
- TEE attestation as audit evidence
GDPR (Europe)
✅ Data Protection Requirements:- Data minimization (zero retention)
- Purpose limitation
- Privacy by design (TEE architecture)
- Right to erasure (no data stored)
- Data portability
- Pseudonymization (hashed IDs)
- Encryption
- Ability to restore availability
- Regular testing
SOC 2 Type II
RedPill is pursuing SOC 2 certification:Principle | Status |
---|---|
Security | ✅ TEE provides technical controls |
Availability | ✅ Load balancing & redundancy |
Processing Integrity | ✅ Attestation proves correct execution |
Confidentiality | ✅ TEE encryption |
Privacy | ✅ Zero data retention |
Other Regulations
- CCPA (California) - Consumer privacy protection
- ISO 27001 - Information security management
- PCI DSS - Payment card data (for future features)
Privacy-Preserving Features
1. Zero-Knowledge Architecture
RedPill cannot know what you’re processing:2. No Logging of Sensitive Data
3. Cryptographic Proof
Get verifiable proof of privacy:Verify Attestation
Learn how to verify TEE execution →
Privacy Best Practices
For Developers
1
Use Environment Variables
Store API keys securely, never hardcode
2
Implement Rate Limiting
Prevent abuse and protect your quota
3
Verify Attestation
For high-security workloads, verify TEE execution
4
Use HTTPS Only
Never make unencrypted requests
For Enterprises
Conduct Security Audit
Conduct Security Audit
- Review RedPill’s open source gateway code
- Verify attestation implementation
- Test with sample sensitive data
Implement Access Controls
Implement Access Controls
- Separate API keys per team/environment
- Use role-based access control (RBAC)
- Rotate keys regularly
Monitor Usage
Monitor Usage
- Set up usage alerts
- Review audit logs
- Track API key usage patterns
Data Classification
Data Classification
- Use RedPill for sensitive data requiring TEE
- Use regular APIs for non-sensitive workloads
- Document data handling procedures
Open Source Transparency
Auditable Code
RedPill’s gateway is open source on GitHub:Community Audits
- Security researchers welcome
- Bug bounty program
- Public disclosure of vulnerabilities
- Regular security updates
View on GitHub
Audit the code yourself →
Comparison with Competitors
Privacy Features Matrix
Feature | RedPill | Tinfoil | OpenRouter | Direct APIs |
---|---|---|---|---|
Gateway in TEE | ✅ Yes | ❌ No | ❌ No | ❌ No |
All requests protected | ✅ Yes | ❌ Only specific models | ❌ No | ❌ No |
Cryptographic attestation | ✅ Yes | ✅ Yes | ❌ No | ❌ No |
Open source gateway | ✅ Yes | ❌ No | ❌ No | ❌ No |
Zero data retention | ✅ Yes | ✅ Yes | ❌ Unknown | ❌ Provider-dependent |
Multi-provider support | ✅ 218+ models | ❌ Limited | ✅ Yes | ❌ No |
Verifiable privacy | ✅ Yes | ✅ Yes | ❌ No | ❌ No |
FAQs
Can RedPill employees read my prompts?
Can RedPill employees read my prompts?
No. Prompts are processed inside TEE. Even system administrators cannot access TEE memory.
Is my data stored anywhere?
Is my data stored anywhere?
No. Request and response content is never stored. Only billing metadata (token counts, model names) is retained for 90 days.
What happens if there's a data breach?
What happens if there's a data breach?
TEE isolation means attackers cannot access your data even with full server access. At most, they could see encrypted metadata.
Can I audit RedPill's privacy claims?
Can I audit RedPill's privacy claims?
Yes! The gateway code is open source. You can also request attestation reports to verify TEE execution.
Does using OpenAI through RedPill protect my data from OpenAI?
Does using OpenAI through RedPill protect my data from OpenAI?
RedPill protects data in transit and during gateway processing. However, once forwarded to OpenAI, their privacy policy applies. For full end-to-end TEE protection, use Phala confidential models.
How does this compare to using VPN?
How does this compare to using VPN?
VPN only protects network traffic. RedPill provides hardware-level protection during processing, which VPN cannot offer.