All inference processing occurs exclusively on the user's local hardware. No data, queries, or responses are transmitted to any external server. This document describes the technical controls that enforce this guarantee.
[User Input] ──► [Local RAM] ──► [Local GPU] ──► [Local RAM] ──► [User Output]
│
No network path exists
Every stage of the inference pipeline executes within the user's own machine.
There is no cloud component, no telemetry endpoint, no update server.
| Layer | Control | Implementation |
|---|---|---|
| L1 | Network binding | Server binds to 127.0.0.1 only — OS-level enforcement, unreachable from LAN or internet |
| L2 | Outbound firewall | Process-scoped outbound block via iptables (Linux/WSL2) and Windows Firewall rules — even a fully compromised server process cannot reach the internet |
| L3 | Dependency integrity | SHA256 manifest of all installed Python packages verified at every startup — detects supply-chain tampering |
| L4 | Weight integrity | SHA256 hashes of model configuration files verified at every startup — detects model substitution or tampering |
| L5 | Conversation storage | RAM only — conversations are never written to disk, never logged, never persisted in any form |
| L5a | Session wipe | Cryptographic overwrite (random bytes) of conversation buffer on session end, idle timeout (1 hour), server shutdown, or intrusion detection |
| L6 | Intrusion detection | Background watchdog monitors for debugging tools, traffic analyzers, and unexpected outbound connections — triggers immediate session wipe and process termination on confirmed violation |
| — | Telemetry | None. Zero analytics, zero error reporting, zero update checks, zero phone-home of any kind |
session_id. Server creates an in-memory SecureConversationBuffer with a per-session 256-bit random key.
POST /v1/session/end with the session IDSIGTERM handler)secrets.token_hex() random bytesNo conversation content is ever written to the wipe log or any other log.
GET /audit returns metadata-only compliance information:
{
"server": "kwyre-9b-spikeserve",
"timestamp": "2026-03-07T12:00:00Z",
"active_sessions": 1,
"security_controls": {
"network_binding": "127.0.0.1:8000 (localhost only)",
"weight_integrity": "enabled",
"conversation_storage": "RAM-only",
"session_wipe": "on_close + idle_timeout_1hr + shutdown + intrusion",
"intrusion_watchdog": { "running": true, "triggered": false },
"content_logging": "NEVER"
},
"note": "Metadata only. No conversation content is ever logged or persisted."
}
Users and auditors can independently verify zero outbound network activity using standard OS tools — no vendor cooperation required:
| Platform | Command |
|---|---|
| Windows | Resource Monitor > Network tab — filter by python.exe |
| Windows (PowerShell) | Get-NetTCPConnection -OwningProcess (Get-Process python).Id |
| Linux / WSL2 | ss -tp | grep python |
| Any platform | Wireshark capture on all interfaces — only 127.0.0.1 traffic visible |
This architecture is designed to satisfy requirements under:
/audit endpoint, access controls via API key authentication, data handling via RAM-only storageHF_HUB_OFFLINE=1 and TRANSFORMERS_OFFLINE=1 hardcoded — no network access after initial setupFor security architecture questions or compliance audits:
security@kwyre.com