Device Security and Data Encryption

Nodia integrates enterprise-grade security across the entire compute stack. From hardware-verified boot sequences to zero-knowledge execution proofs, every node operates with built-in protections that secure data, workloads, and user trust.


Secure Boot & TPM 2.0

  • Secure Boot ensures that only cryptographically signed firmware can execute on the device.

  • TPM 2.0 (Trusted Platform Module) securely stores keys and verifies system integrity during every boot cycle.


AES-256 End-to-End Encryption

  • All task inputs and outputs are encrypted directly on the device using AES-256 before network transmission.

  • Keys rotate on a per-task basis, isolating each job to prevent leakage or replay attacks.

  • Devices never retain sensitive data beyond runtime unless explicitly configured with persistent local caching.


zk-SNARK Proofs

  • Each node produces a zero-knowledge proof after completing a task—verifying correctness without revealing data or execution logic.

  • Proofs are generated directly on-device and verified within seconds.

  • This mechanism ensures provable trust without compromising privacy.


Network Hardening

  • All devices operate on an outbound-only network model, reducing attack surface.

  • Communications use standard secure ports:

    • HTTP: 80

    • HTTPS: 443

    • gRPC: 50051

  • Firewall rules and protocol updates are delivered via regular OTA (over-the-air) updates.


Physical Tamper Resistance

  • Atlas devices feature a chassis intrusion sensor that logs any unauthorized case access.

  • All Nodia hardware includes:

    • Unique device serial numbers

    • Cryptographically sealed hardware identities using HSM-backed signatures

  • These protections prevent counterfeit hardware from joining the mesh.

Last updated