The Zero-Knowledge Posture: Security, Compliance, and the Anti-Trust Architecture
Here is how Turbo Client Systems secures your fleet at the edge.
The Zero-Knowledge Posture: Security, Compliance, and the Anti-Trust Architecture
At Turbo Client Systems, we operate under a strict "Technology Sovereignty" mandate: Never centralize what can be computed locally. In an era of massive cloud data breaches and complex compliance audits, "trust us" is no longer a valid security strategy. Legacy observability tools demand that you pipe petabytes of your sensitive system logs into their central cloud silos. We don't want your data, and our architecture mathematically ensures we can't access it.
Here is how Turbo Client Systems secures your fleet at the edge.
1. The Data Boundary: Content vs. Metadata
Our system is divided by a hard, unbreachable boundary between Content and Metadata.
- Content (Local & Sovereign): System event logs, XML payloads, diagnostic messages, and crash states are processed and stored locally on the endpoint using encrypted SQLite (SQLCipher). This data never touches our servers. You must physically be on the machine (or using your approved remote access tools) to view the raw logs.
- Metadata (Administrative Telemetry): To support heartbeat monitoring, billing, and device health, the agent transmits only non-sensitive metadata (Device ID, Account status, uptime).
2. Compliance by Design (HIPAA, GDPR, CCPA, SOC 2)
Because we do not centralize your system logs, your compliance overhead drops to near zero. We bypass the massive data residency and privacy hurdles simply by not holding the data.
- Zero PII Sprawl: The only user-identifiable string in our entire central database is an email address. Any other identifiers (Account Name, Device Name) begin as anonymous UUIDs unless you explicitly opt to label them.
- Cascading Deletion: If a user, account, or identity is deleted, all associated metadata cascades into total deletion instantly.
- Framework Readiness: * [x] HIPAA: No PHI or sensitive internal application payloads are ever transmitted to our cloud.
- GDPR / CCPA: Full compliance out-of-the-box. We do not aggregate or sell user data, and the right to be forgotten is absolute.
- SOC 2: Our "Anti-Trust" proxy architecture acts as a massive accelerator for your own SOC 2 audits, proving that external diagnostic tools do not expand your attack surface.
3. The LLM Disconnect & Authentication
A common concern with AI-assisted diagnostics is the leakage of proprietary data to public LLMs. Turbo Client handles LLM routing based on your specific enterprise posture:
- Public LLM Routing: For standard deployments utilizing public models (like Claude), the local agent formats the payload and passes it directly to the provider via the user's browser session (e.g.,
claude.com/chat/q={format}). Authentication is handled by the user's existing session with that provider. Turbo Client servers never see the request or the response. - Enterprise Internal LLMs (Roadmap): For organizations running private, internal LLMs, the Turbo Client agent accepts deployment flags (e.g.,
/S /API=key_abc123). This key is stored locally in the agent's encrypted state and validated during the auth check-in. It allows the agent to securely route the diagnostic payload directly to your internal LLM endpoint, ensuring your telemetry never leaves your intranet.
4. Identity, RBAC, and Entra ID Integration
Visibility is strictly limited by role, and because of our distributed architecture, unauthorized remote access to local logs is impossible.
- Current State: Cloud Administrators can only view fleet-wide metadata (uptime, device health). They cannot view local event logs from the web portal.
- Enterprise RBAC Expansion: As our web tooling scales, we will support advanced Role-Based Access Control featuring lineage and inheritance.
- Active Directory Auto-Mapping: Turbo Client will seamlessly map to your existing Entra ID (Azure AD) security groups. For example, mapping a group like
windeets/support-t1-z3-baseto a specific subset of devices ensures that Tier 1 support techs only have metadata and ticketing access to the exact machines in their designated zone.