Skip to main content
Learn • 2 mins read

Confidential Computing

Confidential Computing

Hippius Confidential Compute (HCC) enables you to run workloads inside hardware-encrypted virtual machines using AMD SEV-SNP technology. Every VM runs with encrypted memory that even the host system cannot read, verified through continuous TPM attestation and integrity measurements.

If you are looking for general VM provisioning and lifecycle guidance, see VM Computing.


Key Characteristics

FeatureDescription
Hardware Memory EncryptionAMD SEV-SNP encrypts VM memory at the hardware level - the host cannot read it
Continuous AttestationHCCAM agent continuously proves VM integrity via TPM quotes and SEV-SNP reports
Binary IntegrityTPM + IMA (Integrity Measurement Architecture) detects any binary tampering
Encrypted StorageLUKS2 disk encryption with keys delivered securely via vsock
Secure NetworkingNebula mesh VPN (100.64.0.0/10) for encrypted overlay communication
Miner ReputationOn-chain scoring system tracks miner reliability with rewards and penalties

Goals and Non-Goals

Goals

  • Confidentiality and integrity for workloads running on untrusted miner hardware
  • Continuous attestation proving VMs run unmodified on genuine SEV-SNP hardware
  • Encrypted disk storage with secure key delivery to VMs
  • Tamper detection for miner binaries via TPM/IMA measurements
  • Reputation-based miner selection and reward distribution

Non-Goals

  • General bare-metal attestation (VMs only, using libvirt/QEMU)
  • The host/miner never sees plaintext VM memory or encryption keys
  • No dependency on centralized cloud infrastructure

Glossary

TermDefinition
SEV-SNPSecure Encrypted Virtualization with Secure Nested Paging - AMD's hardware VM encryption
TPMTrusted Platform Module - hardware security chip for attestation and measurements
IMAIntegrity Measurement Architecture - Linux kernel feature measuring binary hashes at execution time
HCCAMHippius Confidential Computing Attestation Module - agent running inside each VM
vsockVirtual socket for direct guest-host communication without a network stack
LUKSLinux Unified Key Setup - standard Linux disk encryption
TCBTrusted Computing Base - the firmware/software versions verified during attestation
VCEKVersioned Chip Endorsement Key - AMD certificate proving genuine SEV-SNP hardware
PCRPlatform Configuration Register - TPM registers extended with integrity measurements

Trust Model

HCC establishes a clear trust boundary:

Trusted:

  • AMD SEV-SNP hardware and vendor certificate chain (ARK → ASK → VCEK)
  • Hippius validator and Nebula CA running on secure infrastructure
  • The guest VM after successful attestation

Untrusted:

  • Miner host operating systems and hypervisors
  • Storage systems (data is encrypted)
  • Network between miners and Hippius (protected by Nebula VPN)

Core Components

The Hippius Confidential Computing Stack (HCCS) consists of specialized components working together:

ComponentRole
hcc-validatorCentral orchestrator for miner registration, VM lifecycle, and attestation verification
hcc-minerHost-side VM manager that spawns SEV-SNP encrypted VMs using QEMU/KVM
hccamGuest attestation agent verifying SEV-SNP environment and reporting to validators
hcc-nebula-caCertificate authority for the Nebula mesh VPN overlay network
hcc-vm-courierVM agent handling firewall rules and certificate management inside user VMs

All components are written in Rust for security and performance.

Architecture Overview

┌─────────────────────────────────────────────────────────────────┐
│ HCCS Network │
│ │
│ ┌──────────────┐ ┌──────────────┐ ┌──────────────┐ │
│ │ hcc-nebula-ca│ │hcc-validator │ │ Lighthouses │ │
│ │ (100.64.0.100) │ (100.64.0.5) │ │ (100.64.0.1-3) │
│ │ │ │ │ │ │ │
│ │ Issues │ │ Orchestrator │ │ Nebula │ │
│ │ Nebula certs │ │ Attestation │ │ Discovery │ │
│ └──────────────┘ └──────────────┘ └──────────────┘ │
│ │ │ │ │
│ └────────────────────┼────────────────────┘ │
│ │ Nebula VPN (encrypted) │
│ ┌────────────────────┼────────────────────┐ │
│ │ │ │ │
│ ┌──────▼──────┐ ┌─────▼──────┐ ┌─────▼──────┐ │
│ │ hcc-miner │ │ hcc-miner │ │ hcc-miner │ │
│ │ (AMD EPYC) │ │ (AMD EPYC) │ │ (AMD EPYC) │ │
│ │ │ │ │ │ │ │
│ │ ┌─────────┐ │ │ ┌────────┐ │ │ ┌────────┐ │ │
│ │ │ HCCAM VM│ │ │ │User VMs│ │ │ │User VMs│ │ │
│ │ │(attest) │ │ │ │(SEV-SNP│ │ │ │(SEV-SNP│ │ │
│ │ └─────────┘ │ │ └────────┘ │ │ └────────┘ │ │
│ └─────────────┘ └────────────┘ └────────────┘ │
└─────────────────────────────────────────────────────────────────┘

How Attestation Works

HCC uses a multi-layer attestation model that verifies both the hardware and software integrity:

Attestation Flow

  1. HCCAM requests system info from the host miner via vsock (no network required).
  2. Miner generates a TPM quote containing IMA measurements of all executed binaries.
  3. HCCAM verifies the TPM signature and checks that the miner binary hash matches expected values.
  4. HCCAM generates an SEV-SNP attestation report proving it runs on genuine AMD hardware.
  5. HCCAM sends the combined attestation to the validator via the miner (over Nebula VPN).
  6. Validator verifies everything and updates the miner's reputation score.
┌─────────────────────────────────────────────────────────────────┐
│ ATTESTATION FLOW │
├─────────────────────────────────────────────────────────────────┤
│ │
│ ┌──────────────────┐ │
│ │ HCCAM (Guest) │ ──1──▶ Request system info via vsock │
│ │ Inside SEV-SNP │ │
│ │ Encrypted VM │ ◀──2── Receive TPM quote + IMA + system │
│ │ │ │
│ │ ┌─────────────┐ │ │
│ │ │ Verify TPM │ │ ──3──▶ Verify TPM signature + IMA hashes │
│ │ │ signature │ │ │
│ │ └─────────────┘ │ │
│ │ │ │
│ │ ┌─────────────┐ │ │
│ │ │ Generate │ │ ──4──▶ Create SEV-SNP attestation report │
│ │ │ SNP report │ │ │
│ │ └─────────────┘ │ │
│ └────────┬─────────┘ │
│ │ │
│ │ vsock + Nebula VPN │
│ ▼ │
│ ┌──────────────────┐ ┌──────────────────┐ │
│ │ Miner (Host) │ ─────▶ │ Validator │ │
│ │ Relays to │ │ Verifies: │ │
│ │ Validator │ │ - SEV-SNP report│ │
│ └──────────────────┘ │ - TPM chain │ │
│ │ - IMA hashes │ │
│ │ - Binary match │ │
│ └────────┬─────────┘ │
│ │ │
│ Updates reputation │
│ Returns next interval │
│ │
└─────────────────────────────────────────────────────────────────┘

What Gets Verified

CheckPurpose
SEV-SNP ReportProves VM runs on genuine AMD SEV-SNP hardware
VCEK CertificateValidates AMD certificate chain (ARK → ASK → VCEK)
TPM QuoteProves miner binary has not been modified
IMA MeasurementsVerifies hashes of all executed binaries match expected values
TCB VersionsEnsures firmware meets minimum security requirements

Security Model

Threat Protection

ThreatMitigation
Compromised Host OSSEV-SNP encrypts VM memory at hardware level - host cannot read
Modified MinerTPM/IMA attestation detects any binary tampering
VM DowngradeMeasurement verification fails if VM is modified
Malicious MinerReputation system tracks reliability with slashing penalties
Network MITMNebula mesh VPN encrypts all communication
Data ExfiltrationPer-VM firewall rules restrict network access

HCCAM Security Guarantees

The HCCAM agent enforces strict security at startup:

  • Refuses to start if /dev/sev-guest is missing (not running on SEV-SNP)
  • Panics on failure if SEV-SNP attestation report generation fails
  • Rejects if VCEK certificate chain validation fails
  • Aborts if measurements don't match expected values

This "fail-secure" design ensures no workload runs in an insecure environment.


Disk Encryption and Key Delivery

Disk encryption is a critical component of confidential computing - it ensures data at rest is protected even when running on untrusted miner hardware. This section covers the technical implementation details.

info

For a quick overview of what disk encryption means for your VMs, see VM Computing - Disk Encryption.

Encryption Specifications

FeatureSpecification
FormatLUKS2 (Linux Unified Key Setup)
CipherAES-256-XTS
Key DerivationArgon2id (memory-hard, resistant to GPU attacks)
Key Length512-bit encryption keys
Per-VM KeysEach VM has a unique encryption key

How Keys Are Delivered

VMs use LUKS2 disk encryption with keys delivered securely:

  1. Key Generation: Validator generates a unique 512-bit LUKS key for each VM.
  2. Image Creation: VM disk image is encrypted with LUKS2 during build.
  3. Boot Request: VM initramfs requests the LUKS key via Nebula VPN.
  4. Secure Relay: Miner forwards the request to the validator (never sees the key).
  5. Direct Delivery: Key is delivered directly into the VM's encrypted memory (SEV-SNP protected).
  6. Disk Unlock: VM decrypts its root filesystem and boots normally.

The miner host never sees plaintext encryption keys - they are delivered directly to the encrypted VM memory.

Key Delivery Flow

┌──────────────────────────────────────────────────────────────┐
│ LUKS KEY DELIVERY FLOW │
├──────────────────────────────────────────────────────────────┤
│ │
│ ┌─────────────────┐ │
│ │ Validator │ Generates and stores unique │
│ │ (Trusted) │ LUKS key per VM │
│ └────────┬────────┘ │
│ │ │
│ │ Key delivered via Nebula VPN │
│ │ (encrypted overlay network) │
│ │ │
│ ▼ │
│ ┌─────────────────────────────────────────────┐ │
│ │ MINER HOST │ │
│ │ ┌─────────────────────────────────────┐ │ │
│ │ │ SEV-SNP Encrypted VM │ │ │
│ │ │ ┌──────────────────────────────┐ │ │ │
│ │ │ │ Initramfs fetches key │ │ │ │
│ │ │ │ directly into encrypted │ │ │ │
│ │ │ │ memory at boot │ │ │ │
│ │ │ └──────────────────────────────┘ │ │ │
│ │ │ │ │ │ │
│ │ │ ▼ │ │ │
│ │ │ ┌──────────────────────────────┐ │ │ │
│ │ │ │ LUKS decrypts root disk │ │ │ │
│ │ │ │ VM boots normally │ │ │ │
│ │ │ └──────────────────────────────┘ │ │ │
│ │ └─────────────────────────────────────┘ │ │
│ │ │ │
│ │ Miner host CANNOT see: │ │
│ │ - Encryption keys (in VM memory) │ │
│ │ - Decrypted disk contents │ │
│ │ - VM memory (SEV-SNP encrypted) │ │
│ └─────────────────────────────────────────────┘ │
│ │
└──────────────────────────────────────────────────────────────┘

Security Guarantees

BenefitDescription
Data ConfidentialityEven if miner hardware is seized, your data remains encrypted
No Key ExposureMiner host never sees plaintext keys or data
Unique Keys Per VMCompromise of one VM doesn't affect others
Hardware-BackedCombined with SEV-SNP, keys exist only in encrypted VM memory
AutomaticEncryption is enabled by default - no configuration needed

Disk Operations Security

Even operations like disk resize maintain security:

  • Miner-side resize: Only expands the QCOW2 image and GPT partition
  • LUKS resize: Happens inside the VM where the key is available
  • No key transmission: The miner never receives the LUKS key during resize

Networking

Nebula Mesh VPN

All HCC communication uses the Nebula overlay network:

  • IP Range: 100.64.0.0/10 (private overlay network)
  • Protocol: WireGuard-based encryption
  • Certificate Authority: hcc-nebula-ca issues certificates to all nodes
  • Discovery: Lighthouse nodes enable peer discovery

Network Isolation

ComponentNetwork Access
VMsIsolated per-VM bridges with NAT
Miner-to-ValidatorNebula overlay only (no public IP required)
User VMsConfigurable egress via hcc-vm-courier firewall

Miner Reputation System

Validators track miner reliability through a reputation system:

Scoring Factors

FactorImpact
Successful AttestationIncreases reputation
Failed AttestationDecreases reputation significantly
TPM FailureMajor penalty - potential slashing
IMA Hash MismatchSevere penalty - binary tampering detected
UptimeConsistent availability improves score
Resource UsageActual usage vs. claimed capacity

Attestation Intervals

Higher-reputation miners attest less frequently (10–30 minutes), while new or low-reputation miners attest more often. Failed attestations trigger immediate re-checks.


Economic Model

HCC aligns with Hippius's usage-based emission model:

  • Rewards match real work: Miners earn based on actual CPU hours and storage consumed
  • Excess α burned: Unused emissions are burned to reduce supply
  • Oracle pricing: α/USD exchange rates set via on-chain oracles
  • Pay-per-use: Each VM pays miners for resources actually consumed

This ensures fair compensation for confidential compute without overpayment for idle capacity.


Hardware Requirements

For Miners Running HCC

RequirementSpecification
CPUAMD EPYC 7003+ with SEV-SNP support
TPMTPM 2.0 module (hardware)
BIOS SettingsAMD Memory Encryption enabled, SEV-SNP enabled
KernelLinux 5.19+ with SEV-SNP and IMA support
HypervisorQEMU with SEV-SNP support, libvirt

Verifying SEV-SNP Availability

# Check SEV-SNP is enabled in kernel
cat /sys/module/kvm_amd/parameters/sev_snp
# Should output: Y

# Verify TPM is accessible
sudo tpm2_getrandom --hex 16

Quantum-Safe Encryption

Hippius is preparing for the post-quantum era:

  • New uploads use quantum-safe encryption by default
  • Existing files are upgraded automatically over time
  • No workflow changes - encryption happens transparently
  • Key protection uses quantum-resistant algorithms

This ensures your data stays confidential even when quantum computers mature.


Why Confidential Computing Matters

Traditional cloud computing requires trusting the infrastructure provider with your data. With HCC:

  • Data stays encrypted in memory, at rest, and in transit
  • Miners cannot read your workload or data
  • Attestation proves VMs run unmodified on genuine hardware
  • Reputation systems ensure reliable miners are rewarded
  • No central trust - cryptographic proofs replace blind faith

This enables sensitive workloads (financial data, healthcare, AI training) to run on decentralized infrastructure without compromising confidentiality.


Continue with VMs

For VM creation, sizing, and access, follow Virtual Machines. For compute architecture and how VMs integrate with Hippius, see VM Computing.