B3IQ private inference currently uses encrypted transport. It is private from the B3IQ control plane, gateway, hosted playground, router accounting, billing exports, and public explorer payloads. It is not yet a claim that prompts and outputs are hidden from the node operator.

Privacy Classes

ClassStatusClaim
private_transportActiveClient encrypts to node transport key. Protects content from B3IQ services and public surfaces, not from the node operator.
verified_confidential_cpuPlannedRequires verified TEE attestation, transport key binding, attestation freshness, and receipt evidence.
verified_confidential_gpuLaterRequires practical confidential GPU hardware, driver stack, and attestation tooling.

Current Baseline

  • Private job request bodies must include a b3iq-private-transport-v1 envelope.
  • Extra request fields are rejected before balance reservation.
  • Private command results store only validated encrypted response envelopes and optional receipt hash.
  • D1 may contain ciphertext envelopes, job state, billing rows, ledger rows, receipt hashes, and signed receipt commitments.
  • D1 must not contain raw prompts, outputs, customer tokens, local node keys, or router secrets.
  • Old terminal ciphertext envelopes can be purged while preserving billing, receipt, and settlement evidence.

What Not To Claim Yet

Avoid

Claim node-operator privacy

Do not market normal consumer nodes as confidential inference nodes until verified TEE execution exists and is tested.

TEE Path

The first confidential CPU target is AMD SEV-SNP. Intel TDX remains a second backend. The TEE path needs:

1

Quote retrieval and verification

Prototype hardware quote retrieval and verifier service integration.

2

Transport key binding

Bind the node transport public key to attestation report data.

3

Sanitized public summary

Publish only verification status, TEE type, provider/verifier, policy ID, measurement/runtime/report-data/public-key/quote hashes, and freshness.

4

Client-side verification

Verify attestation before encryption in strict confidential mode.

5

Receipt commitment

Include attestation hash in signed receipts without exposing raw quotes or certificate chains.

Until that flow is implemented and tested end to end, use private_transport terminology.

Ask a question... ⌘I