Live Demo · Intel TDX · dstack

Most databases are one breach away from full exposure. Most cloud databases are readable by the people who operate them.

Here is the architecture that makes both irrelevant.

Acra Acra is an open-source database encryption proxy by Cossack Labs. It intercepts SQL queries, encrypts sensitive fields before they reach PostgreSQL, and decrypts them transparently on read — all inside the TEE. docs.cossacklabs.com/acra → encrypts each sensitive field inside a hardware-isolated Intel TDX enclave before it ever reaches PostgreSQL. The cloud provider cannot access your plaintext or your keys. The code running inside the enclave is cryptographically verifiable by anyone.

Field-Level Encryption

Individual columns are encrypted by AcraAcra is an open-source database encryption proxy by Cossack Labs. It intercepts SQL queries, encrypts sensitive fields before they reach PostgreSQL, and decrypts them transparently on read — all inside the TEE. docs.cossacklabs.com/acra → (DB encryption proxy) before reaching PostgreSQL. The database stores encrypted ciphertext — unreadable without the proxy.

TEE & Hardware Attestation

Intel TDX isolates the enclave from the host OS, hypervisor, and cloud operator. A cryptographic quote from the TDX chip proves the exact binary executing inside — verifiable by any third party.

Hardware-Bound Key Management

The AcraAcra is an open-source database encryption proxy by Cossack Labs. It intercepts SQL queries, encrypts sensitive fields before they reach PostgreSQL, and decrypts them transparently on read — all inside the TEE. docs.cossacklabs.com/acra → master encryption key is sealed to this exact CVM/TEE via dstackdstack is the open framework for running containers in Confidential VMs (Intel TDX). It handles attestation, per-app key derivation, encrypted storage, and TLS — bring your Docker Compose as-is. A Linux Foundation Confidential Computing Consortium project. github.com/Dstack-TEE/dstack →'s decentralized KMS — based on DKGDKG (Distributed Key Generation) is an MPC protocol where multiple independent TEE nodes jointly compute a secret key — no single node ever holds it in full. In dstack's KMS, this means the master key is never concentrated in one place, survives individual hardware failure, and cannot be extracted by any single operator or cloud provider.. The key never exists outside the TEE and is re-derived on every deployment.

Proof of Cloud Alliance

A vendor-neutral alliance maintaining a signed, append-only registry of cloud hardware identities for Intel TDX and AMD SEV-SNP. Provides independent verification that the hardware running this demo is real and trusted. proofofcloud.org →

The demo runs on a shared dstackdstack is the open framework for running containers in Confidential VMs (Intel TDX). It handles attestation, per-app key derivation, encrypted storage, and TLS — bring your Docker Compose as-is. A Linux Foundation Confidential Computing Consortium project. github.com/Dstack-TEE/dstack → CVM/TEE (Intel TDX). Click below to start the secure environment — it takes about 2 minutes.

Use fictional data only — this is a shared environment. The CVM/TEE stops automatically after 15 minutes of inactivity.

Need TEE-grade data security for your product?

Katvio helps teams design and deploy Trusted Execution Environment architectures — from threat modelling to production. Talk to a specialist.

Speak to a Katvio representative