OwnWire

End-to-end Data Encryption Beyond SSL/TLS

Whitepaper

Zero-Visibility Payload Transport for Web Messaging and AI Workflows

The Zero-Trust Communication Layer Your Infrastructure Needs

Most modern applications rely on HTTPS/TLS, but in real-world deployments TLS is often terminated by intermediaries such as CDNs, WAFs, load balancers, API gateways, and service meshes. Once TLS terminates, sensitive data may be visible to infrastructure components, logs, and operators that are not the application itself.

This problem is amplified in AI systems, where prompts, retrieved documents, embeddings, and responses often contain proprietary or regulated data. OwnWire reduces this exposure by encrypting message payloads at the application layer so that intermediaries see ciphertext only. Decryption happens only inside the OwnWire runtime and is forwarded privately to an internal client.

Problem Statement

TLS protects data in transit between two endpoints, but in modern architectures the "endpoint" is often infrastructure rather than the application. This creates a large trust surface. AI pipelines multiply this problem because data flows through many services, each a potential leakage point.

What OwnWire Does

OwnWire adds application-layer payload encryption on top of WebSockets. Messages are encrypted before traversing infrastructure and decrypted only at a controlled private boundary. OwnWire exposes a public WebSocket for browsers/SDKs and a private internal WebSocket for backend or LLM clients.

Implementation Overview

OwnWire uses ephemeral ECDH on P-256 (or the more secure X25519) to establish a per-session shared secret. Keys are derived using HKDF-SHA256 and used with AES-256-GCM for message encryption. Each message includes a random salt and sequence number to ensure nonce uniqueness and prevent replay.

Cryptographic Primitives
  • Key Exchange: ECDH on P-256 or X25519
  • Key Derivation: HKDF-SHA256
  • Encryption: AES-256-GCM
  • Replay Protection: Per-message salt and sequence number

Decryption and Trust Boundary

Payloads are decrypted only inside the OwnWire runtime and forwarded as plaintext over a private internal interface, typically bound to localhost. Plaintext exists only where computation occurs and is not exposed to proxies, logs, or observability systems.

Security Properties

OwnWire prevents intermediaries such as CDNs, WAFs, load balancers, and logging layers from accessing payload contents. Infrastructure can route traffic but cannot read it.

Threat Scenarios Addressed

OwnWire specifically protects against the following real-world threat scenarios:

  • CDN compromise or malicious CDN employee — Encrypted payloads remain unreadable even with full CDN access
  • Cloud provider compliance audits — Logs contain only ciphertext, not sensitive plaintext data
  • Third-party WAF vendors — WAF can inspect traffic patterns but cannot decrypt message contents
  • Internal platform teams — Infrastructure engineers see encrypted traffic only
  • Observability systems — Monitoring and logging tools cannot expose payload data

Use Cases

OwnWire is particularly valuable in scenarios where sensitive data flows through shared infrastructure:

  • RAG (Retrieval-Augmented Generation) pipelines where documents contain PII or proprietary information
  • Healthcare chatbots handling PHI (Protected Health Information) across CDN infrastructure
  • Financial advisory systems processing proprietary trading signals or customer financial data
  • Customer support AI with access to sensitive account information and support history
  • Multi-tenant SaaS platforms where infrastructure is shared across customers
  • Compliance-sensitive environments requiring data minimization and access controls

Limitations

OwnWire does not protect against a fully compromised host running OwnWire or the internal client. Metadata outside the encrypted payload may still be visible unless explicitly encrypted by the application.

Important: OwnWire encrypts message payloads, not metadata such as session IDs, connection timing, or message sizes. Applications requiring metadata protection should implement additional measures.

Compliance Impact

By reducing the number of systems that can access sensitive payload data, OwnWire supports data minimization principles and simplifies SOC 2, GDPR, and CCPA narratives.

Compliance Benefits
  • SOC 2: Reduces trust boundary and demonstrates defense-in-depth
  • GDPR: Supports data minimization by limiting plaintext exposure
  • CCPA: Strengthens consumer data protection controls
  • HIPAA: Adds additional protection layer for PHI in transit

Conclusion

OwnWire addresses a practical gap in modern systems where TLS alone is insufficient. By encrypting payloads at the application layer and decrypting only at a controlled boundary, OwnWire reduces leakage surface and makes secure AI messaging practical.

Next Steps

Download OwnWire binaries and test in your environment, or contact us for enterprise deployment guidance.

Learn More

Explore our documentation for setup instructions, architecture details, and integration examples.