GetEnclave.io
github.com/zd87pl/private-adapters-wdva

Weight-Delta Vault Adapters

Privacy-preserving AI personalization for your life

End-to-end SaaS solution in-progress • Currently available as open-source implementation

AI Needs Access. You Need Control.

ChatGPT Can Read Your Documents

Upload a contract to ChatGPT? It's now in OpenAI's system.

API Keys Scattered Everywhere

GitHub, Stripe, AWS keys in .env files, notes, emails. Nightmare to manage.

AI Agents Need Your Credentials

Agentic browsers want to book flights, but you have to trust them with passwords.

Your Personal Context is Fragmented

Health data, preferences, history spread across apps. AI can't help without access.

You're forced to choose: Give AI everything and lose privacy, or give AI nothing and lose productivity. Until now.

One Encrypted GetEnclave.io vault. Unlimited Possibilities.

Store Everything Securely

  • • Documents & PDFs
  • • API keys & secrets
  • • Logins & credentials
  • • Personal notes & knowledge
  • • Medical records
  • • Financial data

State-of-the-art encryption. Zero-knowledge architecture. We can't read your data even if we wanted to.

Let AI Access On Your Terms

  • • Chat with your documents
  • • Let agents use your API keys
  • • Share credentials temporarily
  • • Provide personal context

AI processes in encrypted environment. Permissions expire automatically. You see everything.

Control Every Access

  • • Granular permissions per request
  • • Time-limited access (1 hour, 1 day, forever)
  • • Scope restrictions (read vs write)
  • • Complete audit trail
  • • Instant revocation

Your data, your rules. Change your mind? Revoke access instantly.

Why WDVA?

Problem: Your AI assistants need access to your personal information to be useful, but storing that data creates privacy risks.

Solution: WDVA stores encrypted mathematical representations instead of your actual data. Your AI learns from your information without anyone—including us—being able to access it.

Result: Personalized AI that works for you, with privacy baked in from the start.

Your Data Stays Encrypted

Personal information is converted into encrypted AI adapters. Even if someone gets the files, they're useless without your keys.

Secure Processing

Adapters only decrypt inside secure hardware enclaves. Your personalized AI runs in isolated environments that even the server can't peek into.

You Control Access

Grant time-limited permissions to specific AI agents. Revoke access anytime. Your vault, your rules.

Zero-Knowledge Architecture

We can't see your data. Period. The server only handles encrypted blobs. All decryption happens client-side or in secure enclaves.

Lightweight & Fast

Compact adapters mean quick syncing across devices. Your personalized AI is ready when you are.

True Deletion

Want to forget something? Destroy the key and it's gone forever. No backups to hunt down, no "soft deletes." Just cryptographic certainty.

How It Works

From your data to personalized AI, with privacy at every step

1

Train Your Personal AI

Upload your documents, preferences, and information. The system generates a compact AI adapter that captures how you want AI to behave—without storing your actual data.

DoRA fine-tuning generates encrypted adapters
2

Everything Gets Encrypted

Your adapter is immediately encrypted before storage. Only you have the keys. We only see encrypted blobs.

Client-side encryption with your master key
3

Grant Permission to AI Agents

When an AI assistant needs access, you grant time-limited, specific permissions. Want ChatGPT to access your health data for 1 hour? Done. Need Claude to read your work notes for a day? Easy.

Fine-grained consent tokens via MCP protocol
4

Secure Processing

Your encrypted adapter decrypts only inside secure hardware, merges with the AI model, processes your request, then erases all traces. No data leaves the secure zone.

Trusted Execution Environments ensure isolation
5

Delete Anytime

Changed your mind? Destroy the encryption key and your adapter becomes permanently inaccessible. True deletion, guaranteed by cryptography.

Crypto-shredding for instant, verifiable deletion

Real-World Applications

Privacy-preserving personalization across industries and use cases

Agentic Browsers & Web Automation

AI agents book travel, manage subscriptions, and conduct research using your credentials—but never see them directly. Grant 'travel:credentials:use:4h' tokens for flight booking while explicitly excluding banking access.

Temporary credential access
Automatic token expiration
Scope-limited permissions

Healthcare AI & Personal Health

Train adapters on health records, genetic data, and wearables for personalized health insights while maintaining HIPAA/GDPR compliance. Share fitness data with wellness apps while keeping genomic information strictly controlled.

HIPAA compliant
Genomic data protection
Granular health scopes

Enterprise Knowledge Management

Employees interact with proprietary documents, codebases, and business data through AI without exposing IP to third parties. Each employee has encrypted adapters; instant revocation on departure.

IP protection
Per-employee isolation
Instant access revocation

Personal Knowledge Bases

Chat with your documents, notes, and research papers using AI that truly understands your context. Your knowledge remains encrypted; AI processes queries within secure boundaries.

Document understanding
Contextual awareness
Zero data exposure

WDVA vs Traditional Approaches

How Weight-Delta Vault Adapters compare to existing privacy-preserving ML techniques

PropertyTraditional MLFederated LearningWDVA
Data LocationCentral serverOn-device onlyEncrypted vault
Individual DeletionRequires retrainLimitedKey destruction
Cross-user LeakagePossibleGradient attacksIsolated adapters
Consent GranularityBinaryNonePurpose + time + scope
Revocation SpeedDays/weeksNot supportedSeconds
TEE Protection
Zero-Knowledge

Key Advantage: WDVA uniquely provides rapid individual revocation with cryptographically verified deletion, granular consent management with hardware-enforced access control, and protection against cross-user data leakage through complete adapter isolation.