Privacy by architecture
Zero-access by design
Zero-access means Tresor is built so your content is not accessible to Tresor staff or our cloud providers. Your data is readable only where it must be: in your browser and inside secure, attested enclaves that run the AI.
- Only you hold the encryption keys
- Enforced by architecture, not policy
- Verifiable via attestation receipts
In plain English
How it works
Your organization holds the keys
Tresor uses organization and project encryption keys that are created for your workspace and projects. Keys are controlled by your organization, and Tresor is not able to use them to read your content.
When you add a teammate, the required keys are wrapped for that teammate so they can access the same content. When you remove someone, access can be revoked.
Sensitive metadata is encrypted in your browser
Things like project titles, file names, and descriptions can be encrypted client-side (in the browser) before they ever reach the database.
The server stores encrypted data, not readable labels.
Content is processed only inside secure enclaves
To generate answers, the AI needs to work on readable text somewhere. Tresor uses confidential computing enclaves (hardware-protected environments) so plaintext is only handled inside a locked runtime.
This runtime is isolated from operators and the cloud host.
Enclave access is gated and short-lived
Enclaves can receive the minimum keys they need only when they prove they are running approved code (via attestation) and only for a limited time.
Outside enclaves, stored artifacts remain encrypted.
Frequently Asked Questions
Quick answers about Tresor and our Zero-Access approach.
Ready to work with truly confidential AI?
Join professionals who trust Tresor to keep their sensitive work private.