Our guarantee
Two guarantees on this page. First: the user's credentials never reach our servers — the session lives on their device or inside an isolated TEE-hosted client even our team cannot access. Second: the code generating verifications in production is provably the same code published on GitHub. Both confirmed by hardware, not by our word.
Where the credentials actually live
TEE_REMOTE_BROWSER — a confidential VM. The credentials live entirely inside the enclave; even our own engineers, our cloud provider, and the host OS cannot read or modify what's in there. The hardware attestation below proves the enclave is running the published code, not a backdoored copy.The threat model
How it’s enforced
How you verify
What you still trust
The components
Each critical component runs inside its own TEE. TEE_K and TEE_A handle key material and verification orchestration. TEE_REMOTE_BROWSER hosts the user's browser session when the verification doesn't happen on the user's own device, so credentials still never leak to us. It's only used in the nodejs-sdk; the inapp-sdk uses the local in-app browser, where this is unnecessary.

Today · May 13· 84 days ahead are placeholders for future runs
| Session | Timestamp | Image hash | Verdict |
|---|---|---|---|
| 25f37f**** | 5/12/2026, 2:53:55 PM | sha256:d1b55e5c1…454c81 | ✓ Pass |
| d06f95**** | 5/12/2026, 2:51:39 PM | sha256:d1b55e5c1…454c81 | ✓ Pass |
| 6c1ca1**** | 5/12/2026, 2:47:13 PM | sha256:d1b55e5c1…454c81 | ✓ Pass |
| bb247a**** | 5/12/2026, 2:38:42 PM | sha256:d1b55e5c1…454c81 | ✓ Pass |
| 6998b4**** | 5/12/2026, 2:38:27 PM | sha256:d1b55e5c1…454c81 | ✓ Pass |
| Image hash | Tag | Deployed | Status |
|---|---|---|---|
| sha256:d1b55e5c1…454c81 | v2 | Apr 19, 2026 | ● Active |
| sha256:9105c72d0…205f11 | v2 | Apr 19, 2026 | Retired |