Development Site - Testing environment for VettID.org

Sign In Register
Powered by AWS Nitro Enclaves

VettID

Secure. Private. Trusted.

Your digital vault, protected by hardware-level security. A member-owned cooperative where even we can't access your data.

Sign In Register with Invite

Security Without Compromise

VettID uses cutting-edge hardware security to protect your data. Not through promises, but through cryptographic proof.

Hardware-Isolated Vaults

Your vault runs inside AWS Nitro Enclaves, hardware-isolated environments that even AWS employees cannot access. Your secrets exist only in protected memory.

Nitro Enclaves

Cryptographic Attestation

Before connecting, your app verifies the exact code running in the enclave. You don't have to trust us, you can mathematically verify it.

AWS Attestation

End-to-End Encryption

All communication between your device and your vault is encrypted using keys that only exist at the endpoints. Infrastructure sees only encrypted blobs.

X25519 + ChaCha20
?

Zero-Knowledge Design

VettID infrastructure only sees encrypted data. We literally cannot read your messages, access your keys, or view your secrets, even if compelled.

Zero Access

The Trust Model

Traditional services ask you to trust them. VettID uses hardware isolation to make trust unnecessary. Your app verifies the vault before sharing any data.

Security Architecture

Your Device

Holds encrypted credential

Nitro Enclave

Decrypts and processes

Trusted Boundary

VettID Servers

Routes encrypted blobs

Cloud Storage

Stores encrypted data

VettID Staff

No key access

Hardware Attestation

AWS Nitro provides cryptographic proof of the exact code running in your vault. Published PCR values let you verify independently.

Memory Isolation

Your vault's memory is hardware-isolated. Not even hypervisor-level access can read your decrypted secrets.

Sealed Storage

Encryption keys are sealed to the enclave's code. If anyone modifies the code, sealed data becomes permanently inaccessible.

What We Can and Can't See

Transparency about our access. This isn't a policy choice, it's a technical guarantee enforced by hardware.

What VettID Infrastructure Sees

  • Encrypted blobs (opaque ciphertext)
  • Message routing metadata (timestamps, sizes)
  • User account identifiers
  • Vault activity patterns (not content)

What We Cannot Access

  • Your messages and communications
  • Private keys and seed phrases
  • Vault encryption keys
  • Contact lists and connections
  • Any plaintext vault data

A Cooperative Built for You

VettID is not a corporation. We are a member-owned cooperative where every voice matters. Our governance is transparent, our priorities are aligned with yours, and our mission is simple: protect our members.

When you join VettID, you're not just a customer — you're an owner with voting rights on how we operate, what services we offer, and how we protect our community.

Democratic Governance

One member, one vote. Major decisions are made by the community.

Transparent Operations

See how your membership fees are used to protect the community.

No Profit Motive

We exist to serve members, not shareholders seeking returns.

Shared Values

Built by privacy advocates, for people who value their digital freedom.

How It Works

1

Get Invited

Receive an invitation from an existing VettID member who can vouch for your commitment to privacy.

2

Create Your Vault

Your personal vault is provisioned inside a hardware-isolated enclave. Only you control the keys.

3

Verify & Connect

Your app cryptographically verifies the vault before connecting. No trust required, just math.

Ready to Own Your Digital Identity?

Join a community that proves security instead of promising it.

Sign In Register with Invite