NewHow the Agent Session Protocol builds trust between autonomous systems.
Product

Your data stays private. Every action is proven.

You choose who reads your data. Every delivery carries cryptographic proof. Every record is permanent.

You store customer events.

Some contain personal data.

Some are regulated.

You can read all of them.

Your customers do not know that.

One breach exposes everyone.

Encryption at rest is not enough.

You need zero knowledge infrastructure.

npayload gives you exactly that.

Three privacy modes

Choose per channel who can read what. From standard encryption to full zero knowledge.

Standard

TLS in transit, encryption at rest. npayload can read data for routing and logging.

Hybrid

Payload is encrypted client side. npayload sees only routing metadata. Content stays unreadable.

Zero Knowledge

Everything is encrypted before it leaves your device. npayload delivers an opaque blob. It never holds the keys.

Stolen credentials are useless.

DPoP binds every token to the device that created it. Intercepted tokens cannot be reused.

Step 1

Generate

Your device generates an asymmetric key pair. The private key never leaves the device.

Step 2

Bind

The OAuth token is bound to the device public key. Transfer is impossible.

Step 3

Sign

Every request is signed with the private key. URL, method, and timestamp are included in the proof.

Step 4

Verify

npayload verifies the signature at delivery. Stolen token without the key? Rejected immediately.

Every action leaves a permanent, verifiable record.

Every event, every token verification, every signed delivery, and every key rotation is recorded in a hash chain. Altering any record breaks the chain visibly. SOC 2, GDPR, and HIPAA auditors get exactly the proof they need. Nobody can alter or delete a record after the fact.

Tamper proof security log
1
Event encrypted (E2E)
09:14:22
2
Token verified (DPoP)
09:14:23
3
Delivery signed (HMAC)
09:14:24
4
Access audited
09:14:25
5
Key rotated
14:00:00
Hash chained. Tamper evident. Compliance ready.

Your data stays in your region.

Physically separate infrastructure per region and per organization. No shared state between tenants.

Dedicated Cell

Each organization gets its own cell with separate database, encryption keys, and compute resources.

Regional Isolation

Data stays in the region your regulators require. No transfer without explicit bilateral consent.

Cross Region Consent

Flows between regions require mutual agreement from both parties. Audit records every authorization and every revocation.

Before and after npayload Security

Without npayload

  • Data stored in plaintext on shared infrastructure
  • Stolen tokens work from anywhere
  • Audit logs can be modified
  • No control over data location
  • Compliance takes 6+ months to prove
  • One breach exposes everyone

With npayload

  • Three privacy modes per channel
  • DPoP binds tokens to devices
  • Hash chained tamper proof audit
  • Regional data residency enforced
  • SOC 2 GDPR HIPAA ISO 27001 mapped
  • Dedicated cell per organization

npayload vs. building security yourself

FeaturenpayloadBuild it yourself
Three privacy modesMonths of work
Device bound authenticationWeeks of work
Tamper proof audit trailMonths of work
Regional data residencyComplex infrastructure
Dedicated cell per tenantExpensive to build
SOC 2, GDPR, HIPAA, ISO 270016+ months of work
Consent based cross org sharing
HMAC signed deliveriesDays of work
Audit streaming to GRCMonths of work

Frequently asked questions

What is zero knowledge mode exactly?+
Your data is encrypted before it reaches npayload. npayload delivers an encrypted blob. It never holds the keys.
What happens if our credentials are stolen?+
DPoP binds tokens to the device's private key. A stolen token is useless without the key, which never leaves the device.
Can we choose where our data is physically stored?+
Yes. Each cell runs in a specific region on separate infrastructure. Data never leaves without explicit mutual consent.
What compliance frameworks do you support?+
SOC 2 Type II, GDPR, HIPAA, and ISO 27001. Enterprise plans include audit streaming and dedicated compliance reporting.
How is tenant isolation different from other platforms?+
Dedicated cells per organization with separate databases and encryption keys. No shared state. A compromised cell cannot access another.
Can someone at npayload read our data?+
In zero knowledge mode, no. In hybrid mode, only routing metadata. In standard mode, yes, like any cloud provider.
How do you handle a security breach?+
Cell isolation limits blast radius to one organization. Hardware managed keys and permanent audit trails provide full forensic evidence.
Do you support BYOK (bring your own key)?+
Yes on Enterprise plans. You control the keys. Revoke them and npayload can no longer access your data.