Security
Multi-layer defense. Cryptographic provenance.
Encryption at rest and in transit. Capability-based access control. Audit chains anchored in BLAKE3. Zeroize on drop. No ambient authority. The threat model is documented and the boundaries are testable.
At a glance
What's here.
The shape of this page in six lines.
AES-256-GCM at rest
Per-namespace keys derived via HKDF-SHA256.
TLS 1.3 in transit
rustls — no OpenSSL. Modern cipher suites only.
BLAKE3 audit chain
Tamper-evident, Merkle-anchored, replicable to external attestors.
Capability tokens
No ambient authority. Every read/write requires an explicit capability.
Zeroize on drop
Secret material wiped from RAM on drop paths.
Argon2 password hashing
OWASP-recommended parameters; tunable per-deployment.
Reference
Useful links.
referencebash
# Verify the audit chain externally
$ minds audit verify --from 2026-10-01 --to 2026-10-31 \
--attestor https://attestor.example.com
✓ 14,832 entries verified · Merkle root matchesSpecs
Details.
At a glance
- At rest
- AES-256-GCM · per-namespace keys
- In transit
- TLS 1.3 (rustls)
- Signatures
- Ed25519 · FROST threshold (multi-sig)
- Hashing
- BLAKE3 · Argon2 for passwords
- Audit
- BLAKE3 Merkle chain · externally attestable
Guarantees
- Durability
- fsync per WAL commit
- Isolation
- MVCC · snapshot
- Audit
- BLAKE3 Merkle chain
- Encryption
- AES-256-GCM per-namespace
- Concurrency
- 100K+ ops/sec
Get started in an afternoon.
Run anywhere — Akasha Cloud, on-prem, or air-gapped.