Dedicated Fly.io Machines
Each customer gets their own Fly.io Machine with its own kernel, memory, and network stack. Not Docker containers on shared infrastructure — hardware-level isolation with persistent encrypted volumes.
Security
Every Kaimera customer runs on dedicated, isolated compute with zero exposed ports. The same isolation model used by banks — not the shared containers used by most SaaS.
How your data flows
Every request is encrypted with TLS 1.3 end-to-end. Your dedicated machine runs on Fly.io's global network with hardware-level isolation from every other customer.
Security Architecture
Each customer gets their own Fly.io Machine with its own kernel, memory, and network stack. Not Docker containers on shared infrastructure — hardware-level isolation with persistent encrypted volumes.
All traffic is encrypted with TLS 1.3 end-to-end. Every machine runs on Fly.io's global network with built-in DDoS protection and private networking between services.
TLS 1.3 on every connection. API keys and credentials stored in a service-role-only encrypted secrets table. No plaintext secrets ever touch application logs or client-facing responses.
OAuth 2.0 with PKCE for all integrations. Row-level security on every database table ensures users can only access their own organization's data. Service-role isolation for sensitive operations.
Multiple layers: HSTS and security headers on every response, Fly.io private networking between services, token-authenticated gateway protocol, and timing-safe secret comparison.
Security headers (HSTS, X-Frame-Options, CSP, Referrer-Policy, Permissions-Policy) enforced on every response. No camera, microphone, or geolocation permissions granted. HTTPS-only — no HTTP fallback.
Isolation Comparison
| Security Property | Shared Containers (most SaaS) | Kaimera (Dedicated Machines) |
|---|---|---|
| Kernel isolation | Shared kernel | Separate kernel per customer |
| Memory isolation | Namespace-level (software) | Hardware-enforced (hypervisor) |
| Network stack | Shared, partitioned | Dedicated per customer |
| Blast radius of compromise | All customers on host | Single customer only |
| Side-channel attacks | Possible (shared CPU cache) | Mitigated (separate machine) |
| Independent patching | Host-level only | Per-customer machine lifecycle |
In Practice
Compliance
Infrastructure and practices designed for SOC 2 from day one. Formal audit underway.
EU data protection compliance. Data processing agreements available on request.
Payment processing handled entirely by Stripe. We never store or process card data.
We provide security documentation, data processing agreements, and can complete vendor security assessments for your team.
0
Shared Compute
1:1
Dedicated Machine Per Customer
TLS 1.3
On Every Connection
Responsible Disclosure: We welcome security researchers. If you discover a vulnerability, please report it to security@kaimeraos.ai. We commit to acknowledging reports within 48 hours.