A vendor-neutral audit substrate that turns every TEE-attested inference call into a tamper-evident cryptographic receipt, anchored on-chain, cross-chain readable, and verifiable by a regulator
Meru is confidential AI you can prove. Every regulated business in 2026 is hitting the same wall: their teams want
ChatGPT-quality AI on private data — bank statements, medical records, legal contracts, internal compliance docs — but their
compliance officers can't approve it. Why? Because there's no tamper-proof way to show what the AI actually did with the
data. The AI vendor stores a copy of every prompt. The model could leak. The audit log could be edited. A regulator can't
independently verify any of it.
Meru solves this by producing a cryptographic receipt for every AI inference, anchored on a public blockchain that the
regulator can read without trusting anyone.
How it works:
1. You upload a document. Meru encrypts it (AES-256-GCM with browser-side key derivation) and stores the ciphertext on 0G
Storage.
2. You ask the AI a question. The question travels encrypted to a hardware-secured enclave — a TEE (Trusted Execution
Environment, Intel TDX + Phala dStack) running on 0G Compute. Even the cloud operator can't peek inside while it runs.
3. The AI's answer comes back with a cryptographic signature from the enclave.
4. That signature gets anchored on 0G Chain (real mainnet, chain 16661) and re-attested on Ethereum Sepolia as an independent
witness. Not a bridge — zero value crosses, just the receipt. Two independent ledgers; if one fails, the audit survives on
the other.
5. A regulator with nothing but a browser can verify the receipt against both chains — through a standalone HTML widget that
talks directly to the chains, never to Meru's servers.
The technical primitive is a signed-bundle wire format: (answer, sourceChunkHashes, modelId, timestamp, signature) verified
inside the TEE and anchored on-chain via a commit-reveal scheme with a 60-second contract-enforced window — defending against
block-builder front-running on the audit log itself.
What's actually live, on real mainnet:
- Provenant.sol deployed at 0xA8296DfF7C2faD1170e880d71aF92B2F201D30C5 on 0G Aristotle (7,378 bytes verified bytecode)
- Real Sealed Inference against a Phala TEE provider running gpt-5.4-mini (dstack-pha-prod5.phala.network)
- Real on-chain commit-reveal cycles with the contract-enforced 60s gap
- A permissionless JSON-RPC indexer anyone can run
- A standalone HTML verifier widget — single file, no SDK, no backend
One command verifies the entire chain end-to-end: cd backend && npm run smoke returns 8/8 ✅ against live mainnet.
The thesis in one sentence: Meru is the open-source, decentralized, on-chain-anchored equivalent of
https://security.apple.com/blog/private-cloud-compute/ — for regulated industries. Apple's PCC is the canonical reference
architecture for confidential AI inference, but it's closed-source, single-vendor, and consumer-facing. Meru is the
multi-vendor, multi-tenant, permissionless, enterprise-grade version of the same five design requirements, built on the 0G
stack.
Who buys this: Indian fintech AI vendors hitting the DPDPA Rule 13(4) deadline (Nov 2026, ₹250 cr penalty). EU-classified
"high-risk AI deployers" preparing for EU AI Act Article 12 (full enforcement Dec 2027). The 12,000+ Significant Data
Fiduciaries under India's data protection law. TAM ≈ $1.5B-$4B by 2028.<pre><code class="language-markdown"><span class="hljs-section"># Roadmap</span> Started from a blank slate. Built end-to-end against three 0G primitives (Storage + Compute + Chain). Deployed on real Aristotle mainnet, not testnet. Phase 1 — Architecture + research <span class="hljs-bullet">-</span> Decided to compose all three 0G primitives into one coherent audit substrate, not a single-primitive demo. <span class="hljs-bullet">-</span> Validated the technical thesis against Apple Private Cloud Compute's 5 design requirements. <span class="hljs-bullet">-</span> Named TEE.fail / WireTap (Oct 2025) as defense-in-depth challenges and documented them before writing code. Phase 2 — Smart contracts <span class="hljs-bullet">-</span> Wrote Provenant.sol — ERC-721 corpus iNFT + on-chain commit-reveal (60-second contract-enforced gate) + ERC-7857 interface shim + EIP-191 bundle-signature verification with block.chainid replay protection. <span class="hljs-bullet">-</span> Wrote ProvenantReader.sol — Sepolia mirror with chain-bound digest re-attestation. <span class="hljs-bullet">-</span> 15 Hardhat unit tests passing. <span class="hljs-bullet">-</span> Slither static analysis: 49 informational, 0 high, 0 medium. <span class="hljs-bullet">-</span> Deployed to 0G Aristotle mainnet at 0xA8296DfF7C2faD1170e880d71aF92B2F201D30C5 (7,378 bytes verified bytecode). <span class="hljs-bullet">-</span> Sepolia mirror deployed to the same address. Phase 3 — Backend + 0G integration <span class="hljs-bullet">-</span> Wrote the Sealed Inference SDK wrapper using the canonical @0gfoundation/0g-compute-ts-sdk broker. <span class="hljs-bullet">-</span> Wired against a real Phala TEE provider running gpt-5.4-mini at dstack-pha-prod5.phala.network. <span class="hljs-bullet">-</span> TEE chat-signature verification via processResponse against on-chain teeSignerAddress. <span class="hljs-bullet">-</span> Hard-fail gate when the verification handle is missing — no silent downgrade to unverified. <span class="hljs-bullet">-</span> Anchor → Sepolia mirror flow. <span class="hljs-bullet">-</span> Encrypted-at-rest corpus on 0G Storage (AES-256-GCM + HKDF per-corpus subkeys). <span class="hljs-bullet">-</span> Client-side X25519 encrypted intents in the browser. <span class="hljs-bullet">-</span> 5 backend MEV tests passing. <span class="hljs-bullet">-</span> One-command mainnet smoke (npm run smoke): 8/8 ✅ across RPC, bytecode, ERC-721 + ERC-7857 interface shim, corpusOf, inferenceCountOf, real inferenceAt event reads. Phase 4 — Permissionless indexer <span class="hljs-bullet">-</span> Standalone Node.js package. <span class="hljs-bullet">-</span> JSON-RPC 2.0 + REST + WebSocket push of every InferenceLogged event. <span class="hljs-bullet">-</span> Multi-destination relayer. <span class="hljs-bullet">-</span> KelpDAO anti-pattern gate (off-by-default fallback signer) documented in code. Phase 5 — Reference UI <span class="hljs-bullet">-</span> Next.js 16 + React 19 + Tailwind v4. <span class="hljs-bullet">-</span> Light-mode-first "AI notary" aesthetic — calm, document-oriented, intentionally not "crypto-app." <span class="hljs-bullet">-</span> Chat interface as a reference application — the product is the protocol; the chat is the wedge. <span class="hljs-bullet">-</span> PipelineTracker only advances on real backend signals (no fake setInterval). <span class="hljs-bullet">-</span> DemoModeBanner discloses the Level-1 TEE attestation signer placeholder. <span class="hljs-bullet">-</span> ProvenanceModal links to the standalone verifier widget. Phase 6 — Standalone verifier (the demo's punchline) <span class="hljs-bullet">-</span> Single static HTML file. No SDK. No Meru backend in the loop. <span class="hljs-bullet">-</span> Reads 0G Aristotle RPC + Sepolia RPC directly. <span class="hljs-bullet">-</span> Recomputes the audit digest locally. <span class="hljs-bullet">-</span> ✓ or ✗ verifies any bundle entry. <span class="hljs-bullet">-</span> A regulator with a browser can verify any Meru inference against live mainnet — even if every Meru server is offline. Phase 7 — Documentation discipline Five load-bearing docs: <span class="hljs-bullet">-</span> THREAT-MODEL.md — named assumptions + what we don't claim <span class="hljs-bullet">-</span> PRODUCTION-VISION.md — Web 4.0 confidentiality-rails architecture target <span class="hljs-bullet">-</span> HACKATHON-MVP.md — wedge + extensibility roadmap (agentic AI, MCP, multi-agent) <span class="hljs-bullet">-</span> INTEGRATING-0G-SEALED-INFERENCE.md — broker SDK recipe (useful for any 0G builder) <span class="hljs-bullet">-</span> MERU-VS-PCC-VS-DSTACK.md — Apple PCC's 5 design requirements mapped against Meru + Phala dStack <span class="hljs-bullet">-</span> E2E-ENCRYPTED-INFERENCE.md — v2 enclave-owned-key handshake protocol --- Final state <span class="hljs-bullet">-</span> ~50 source files across 4 packages <span class="hljs-bullet">-</span> ~36,400 lines of TypeScript + Solidity <span class="hljs-bullet">-</span> 20 unit tests passing <span class="hljs-bullet">-</span> 0 high / 0 medium static-analysis findings <span class="hljs-bullet">-</span> Real mainnet deployment + real Phala TEE inference + real cross-chain mirror + permissionless indexer + standalone verifier <span class="hljs-bullet">-</span> Solo build, alongside full-time job --- <span class="hljs-section"># Production Roadmap — the path from this MVP to enterprise-grade </span> The MVP is a deliberate wedge slice of a larger system. Three forward versions, each with concrete engineering plans documented in docs/PRODUCTION-VISION.md. v2 — Limited beta (Q3 2026) Closes the v1 trust-boundary gaps: <span class="hljs-bullet">-</span> Enclave-owned X25519 keypair generated at boot via Phala dStack KMS — backend becomes pure transport, never sees plaintext (closes the encrypted-intent "bridge mode" gap). <span class="hljs-bullet">-</span> Real Shutter Network keyper integration for commit-reveal — replaces the in-memory threshold scaffold with a permissionless keyper quorum. The 3-line swap-in is already documented in backend/src/mev/shutter.ts. <span class="hljs-bullet">-</span> Browser-side document encryption — user holds the corpus key; the backend never touches plaintext docs. <span class="hljs-bullet">-</span> Versioned corpus manifests anchored on-chain so multi-document corpora produce durable provenance across appends. <span class="hljs-bullet">-</span> Mainnet cross-chain mirrors to Base + Linea + Ethereum L1 (Sepolia deprecates Sept 2026). <span class="hljs-bullet">-</span> RevokeEnclave + EnrollEnclave events on Provenant.sol for signer lifecycle. <span class="hljs-bullet">-</span> Per-chunk retrieval-trace commitments inside the enclave — sourceChunkHashes[] graduates from "corpus fingerprint" to actual retrieval evidence. Effort: ~6-8 weeks focused, one engineer. Main dependency: deploy a custom dStack app on Phala. v3 — Production GA (Q1 2027) Closes the operational gaps for enterprise sale: <span class="hljs-bullet">-</span> HSM/KMS-backed key management (AWS KMS / HashiCorp Vault) — per-corpus key rotation + revocation. <span class="hljs-bullet">-</span> Multi-attestation quorum — Intel TDX + AMD SEV-SNP. Defense-in-depth against single-vendor attestation-key compromise (TEE.fail / WireTap class attacks). <span class="hljs-bullet">-</span> Reproducible-build pipeline + binary transparency log — Sigstore-style; closes the verifiable-transparency gap that Apple PCC sets the bar for. <span class="hljs-bullet">-</span> Multi-tenant RBAC with org scopes, audit-role separation, machine-readable compliance evidence-export bundles. <span class="hljs-bullet">-</span> Durable workflow orchestration (Temporal / Inngest) replacing inline async/await. <span class="hljs-bullet">-</span> Multi-region indexer mesh with Postgres + Redis + S3/R2 checkpointing for DR. Effort: ~6 months with a 2-3 engineer team, gated by enterprise design-partner conversations. v4 — Protocol layer (2027+) The audit primitive becomes a substrate for the wider 0G ecosystem: <span class="hljs-bullet">-</span> Audit Substrate v1.0 spec published as a 0G ecosystem standard — any 0G app emitting AI-inference events uses the same wire format. <span class="hljs-bullet">-</span> Indexer-economics — per-query micro-fees to indexers for serving audit data to regulators. Aligns indexer incentives with auditor demand. <span class="hljs-bullet">-</span> Cross-substrate composability — Meru receipts referenced by DePIN protocols (proof of physical-world action), agentic finance protocols (proof of strategy decision), identity protocols (proof of credential issuance). Commercial path <span class="hljs-bullet">-</span> Q3 2026: v2 limited beta with 3 design partners (Indian fintech AI vendors aligned with DPDPA Nov 2026 deadline) — free during beta. <span class="hljs-bullet">-</span> Q4 2026: v3 GA + cold-outbound to Tier-1 buyer list. Target: 5 paying customers, $250K–$350K ACV. <span class="hljs-bullet">-</span> Q1 2027: protocol-tier launch + 0G ecosystem partnership announcements. Direct addressable buyers (Tier 1, 2026-2028): ~3,500 EU-classified "high-risk AI deployers" + ~12,000 Indian Significant Data Fiduciaries under DPDPA. TAM ≈ $1.5B–$4B by 2028. </code></pre>
<p>self-funded</p>