Trustless Mode (E2EE)
End-to-end encrypted content moderation with zero knowledge
Introduction to Trustless Mode
Klyra’s Trustless Mode provides end-to-end encrypted (E2EE) content moderation, allowing you to moderate sensitive content without ever exposing the plaintext to Klyra’s servers. This zero-knowledge approach ensures maximum privacy and security for applications where data confidentiality is critical.
Trustless Mode is available on Business and Enterprise plans. Contact us to enable this feature.
How Trustless Mode Works
Client-side encryption
Your application encrypts the content using a locally generated encryption key before sending it to Klyra.
Encrypted processing
Klyra processes the encrypted content using secure multi-party computation (MPC) and homomorphic encryption techniques.
Encrypted results
Moderation results are encrypted and sent back to your application.
Client-side decryption
Your application decrypts the results using the original encryption key.
Technical Implementation
Step 1: Generate an encryption key
Step 2: Initialize the client with Trustless Mode
Step 3: Use the API as normal
The SDK handles all encryption and decryption automatically. Use the API as you normally would:
Technical Details
Encryption Specification
- Encryption algorithm: AES-256-GCM with HKDF key derivation
- Key generation: Client-side CSPRNG with 256-bit entropy
- Secure computation: Homomorphic encryption for specific moderation tasks
- Zero knowledge proofs: Used to validate results without revealing content
Security Guarantees
- Content is encrypted before leaving your application
- Encryption keys never leave your system
- Klyra’s servers never see plaintext content
- Moderation results are verifiable without decryption
- Full forward secrecy with per-request nonces
Limitations
While Trustless Mode provides maximum privacy, there are some limitations:
- Model accuracy: Some moderation tasks may have slightly reduced accuracy compared to non-encrypted processing
- Performance: Processing encrypted content takes approximately 1.5-2x longer
- Content types: Currently available for text and image moderation only
- Language support: Full support for English, with partial support for other languages
Verification and Audit
Klyra’s Trustless Mode implementation has been independently audited by security firms:
The client-side encryption libraries are open source and available for inspection:
Enterprise Options
Enterprise customers can benefit from additional Trustless Mode features:
- Hardware Security Module (HSM) integration
- Bring Your Own Key (BYOK) support
- On-premise deployment options
- Custom encryption schemes
- Additional auditing and logging capabilities
Contact our enterprise team to learn more about these options.