Sovereignty by Cryptography
Your data is not protected by our "terms of service" — it is protected by the laws of mathematics. If you do not sign the request, the vault does not open. Even we cannot bypass this.
Trust and security
TurtleShell is designed so ownership, authorization, storage, and operations reinforce the same promise: people and teams should not need to trust invisible platform superpowers.
That principle shapes how requests are authorized, where data lives, and how tenants move.
Security Manifesto
These principles are not aspirational. They are architectural constraints baked into every layer of the system.
Your data is not protected by our "terms of service" — it is protected by the laws of mathematics. If you do not sign the request, the vault does not open. Even we cannot bypass this.
In the physical world, you have a front door. In Turtle Shell, your data lives in a physically isolated compartment. There are no "shared tables" where a leak in one can lead to a flood in another.
You carry your shell; you are not trapped in ours. True sovereignty means you can pack your data, your identities, and your permissions and move to any node in the world without losing a single bit of authority.
We do not need to know who you are to know you are authorized. By using ZCAP-LD, we replace invasive profiles with cryptographic "hall passes" that grant specific access without requiring a name.
We assume the infrastructure is compromised. Therefore, data is encrypted at rest, in transit, and gated by keys that never leave your control.
How it holds up
Every capability invocation is cryptographically signed, and delegation chains are validated before access is allowed.
Tenants do not share tables. They live in separate databases, buckets, or directories depending on deployment profile.
Tenant data is protected with a layered key hierarchy and encrypted at rest by default.
Capability grants can be revoked without erasing the owner-first model or changing who fundamentally controls the tenant.
Export and import are part of the trust story because people need a credible path to move their stores elsewhere.
Metrics, traces, structured logs, and admin audit records help operators prove what happened and diagnose issues safely.
What TurtleShell enforces
What deployments still manage