Skip to main content

Core API

The primary way developers and applications interact with our specialized models is through the Dexodus Core API. However, this is not a standard API. Every call made to our system is processed within a secure cluster that leverages Trusted Execution Environments (TEEs) to protect data while it's in use.

This "API with TEE" architecture provides end-to-end, verifiable security for every request. Here’s how it works:

  1. Encrypted Request & Verification: A client sends a request, already encrypted on their end, to the Dexodus API gateway. This request is then dispatched to our Confidential Compute Cluster. Before processing, the client's system can perform

    Enclave Attestation—a cryptographic protocol where the TEE proves it is a genuine, untampered hardware environment running the authorized code. This step establishes verifiable trust directly through the API.

  2. Secure Execution: Once trust is established, the encrypted request is passed into the secure enclave of the TEE. Only inside this hardware-isolated environment is the user's data decrypted and processed by the SLM. At no point are the client's raw data or the model's own parameters exposed in cleartext memory accessible to the host system.

  3. Encrypted Response: The result of the AI's computation is encrypted before it leaves the enclave and is sent back to the client through the API.

This fundamental commitment to Confidential Computing allows us to make a powerful, cryptographically verifiable promise to our clients: "You can leverage our intelligence without revealing your secrets". It is the core of our trust proposition, designed to meet the stringent security demands of the most sophisticated participants in the financial ecosystem.

Core API Architecture