Skip to main content

Introduction

Continuum provides e2e encrypted prompts and model weight protection. E2E encryption in this context means that prompts are encrypted on the client, decrypted inside Continuum workers, and encrypted before sending them back to the client. Only the prompt text is encrypted through Authenticated Encryption to keep the rest of the request information, such as token length, available to the service provider for processing. Data inside the worker is protected by the Continuum OS. The encryption key is not accessible to the operator of Continuum.

Continuum OS leverages three technologies: remote attestation, memory encryption and sandboxing.