N/01Confidential Inference Gateway

Zero-trust
AI inference,
cryptographically
guaranteed.

Enterprise prompts encrypted client-side, decrypted only inside an attested AWS Nitro Enclave. No plaintext ever reaches the model provider, infrastructure owner, or cloud operator.

SOC 2
Type II Ready
HIPAA
Compliant
GDPR
Article 28
FedRAMP
Ready
Enterprise client
SDK · WebCrypto
pii69ca…8400
pii8163…1577
Latensgate
Attested
Nitro Enclave · us-east-1
PCR0: 000000…000000
attest: sha384:c8f8e1…b4c5d
enc652a…d997
enc5278…bedd
LLM provider
Bedrock · OpenAI · Self-hosted
23ms
Median inference latency
0bytes
Plaintext leaked, ever
4.2M
Attestations issued
99.98%
Enclave uptime · 90d
Trusted by regulated enterprises in eight industries
Meridian Bank
Axiom Pharma
Nordstar Gov
Kronos Defense
Helix Health
Atlas Capital
Polaris Labs
Vertex Fintech
Meridian Bank
Axiom Pharma
Nordstar Gov
Kronos Defense
Helix Health
Atlas Capital
Polaris Labs
Vertex Fintech
file://prompt-log-q4.txt
Exposed
01
PROMPT_ID req_a3f9c42b · transcript_excerpt:
02
03
████████ Patient diagnosis: ████████████████████████████
04
05
██████ SSN: ███-██-████ · DOB: ████-██-██ · MRN: ████████
06
07
████ Q3 acquisition target: ████████████ Inc. (████████)
08
09
████ Internal model serving from: ████████-internal.com/v2
Your prompt after sending to a public LLM API
N/02The Problem

Your prompts
are not
private.

Every regulated enterprise that wants to use modern LLMs hits the same wall: the model provider, the cloud operator, and your own infrastructure team can read every prompt. There is no cryptographic guarantee otherwise, until now.

01
Model providers train on your data
Even with opt-out flags, your prompts touch shared multi-tenant infrastructure.
02
No cryptographic proof of data handling
Privacy policies are not enforceable guarantees. Audits happen quarterly. Breaches happen continuously.
03
Regulatory frameworks prohibit public GenAI APIs
GDPR Article 28, HIPAA, FedRAMP all require provable data sovereignty that standard APIs cannot deliver.
N/03Pipeline

Four stages.
Each one
provable.

A single request passes through four cryptographically chained stages. Each stage is verifiable independently. None requires trust.

01
Encrypt

SDK encrypts prompts client-side using the enclave's public key. Plaintext never leaves your browser unencrypted.

02
Attest

AWS Nitro produces a signed attestation document with PCR measurements proving the enclave is running unmodified code.

03
Infer

Inside the enclave: decrypt, redact PII, run inference, re-encrypt. No process outside the enclave sees plaintext.

04
Verify

Each request returns an audit receipt with an attestation hash. Anyone can verify it on the public verifier.

N/04Architecture

Inside the
enclave boundary.

A vsock-bridged pipeline. Every layer outside the boundary handles ciphertext only. The boundary itself is cryptographically attestable end-to-end.

Enterprise Client (SDK)
WebCrypto · prompt encryption · key sealing
Vercel Edge / ALB
TLS termination · DDoS · routing
EC2 Parent Instance
Dumb pipe · no plaintext access
Nitro Enclave · Hardware-isolated
vsock://latens-enclave:5000
KMS Attestation
Signed attestation doc · PCR0–PCR15
Prompt Decrypt
AES-GCM · ephemeral session key
PII Redaction
Tokenize → redact → tokenize back
Inference
Bedrock · OpenAI · self-hosted
Response Encrypt
Re-encrypt to client public key
Model Provider
Bedrock · OpenAI · self-hosted (encrypted bytes)
N/05Compliance
SOC 2 Type II
Ready
HIPAA
Compliant
GDPR Art. 28
Compliant
FedRAMP
Ready
ISO 27001
In Progress
N/06Pricing

Usage-based. No lock-in.

All tiers include cryptographic attestation, PII redaction, and the full audit pipeline. You pay for inference volume, not features.

Developer
Free
1,000
requests / mo
  • Shared enclave (us-east-1)
  • Claude 3.5 Sonnet · Llama 3.1 70B
  • Public attestation verifier
  • Community support
Most Popular
Team
$999/ mo
100,000
requests / mo
  • Shared enclave with dedicated keys
  • All public + private models
  • CSV / Webhook audit export
  • SOC 2 + HIPAA BAA
  • 99.9% SLA · 8h response
Enterprise
Custom
Unlimited
requests
  • Dedicated enclave + KMS keys
  • Self-hosted model support
  • Bring-your-own AWS account
  • FedRAMP, GDPR DPA, ISO 27001
  • 99.99% SLA · 1h response · CSM
N/08From the Field

“We could not ship our GenAI pipeline to legal review until Latensgate. The attestation receipts moved the conversation from trust to proof.

Yasmin Karimov
VP Platform Security · Atlas Capital
Yasmin Karimov, VP Platform Security at Atlas Capital
REC00:00:14:08
N/07Get Started

Deploy confidential
inference in 14 days.

Request access to a dedicated demo enclave. Your security and compliance teams will have signed attestation receipts before the second meeting.

access@latensgate.com·SOC 2 Type II·PGP key on request