Your device
Where your data lives
Cloud GPU (opt-in)
When you need more power
Need total isolation? Self-host everything.
Run QP entirely on your own hardware with zero outbound connections. Local AI models, local embeddings, local everything. Works in air-gapped classified environments where the internet cannot go.
Audit trail
Every AI action is on the record.
Every time your AI makes a decision, QP seals a tamper-proof record of what happened. Not a log file. A cryptographically signed, hash-chained record that holds up in audits and in court.
Reasoning is captured before execution, not after. That means contemporaneous evidence of deliberation, not a post-hoc narrative.
Trigger
What started this action? Who or what requested it?
Context
What did the AI know at the time? What files and rules were active?
Reasoning
Why did it choose this approach? What alternatives did it consider?
Authority
Who approved this action? What policy allowed it?
Execution
What tools were called? How long did it take? What resources were used?
Outcome
Did it succeed? What changed? Were there side effects?
Each record links to the previous via SHA3-256 hash. Modify or delete any record and the chain breaks. Signed with Ed25519 (classical) and optionally ML-DSA-65 (post-quantum). Tamper is mathematically detectable.
Kill switch
You can stop everything. Instantly.
Five levels of granularity, two modes, under 500 milliseconds. The kill switch cannot be disabled, overridden, bypassed, or removed. Every activation is itself sealed into the audit trail.
Stop at any scope
Two modes
Soft
Finish the current step, then stop. State is preserved. Resume when ready.
Hard
Immediate termination. Full stop. Requires restart to resume.
Verified AI
Your AI admits when it doesn't know.
Every response passes through a verification gate before reaching you. Claims are checked against your documents and cited sources. If something can't be verified, QP says so instead of making it up.
Verified
The claim is supported by your documents or cited sources. You can trust it.
Retrievable
QP doesn't have the answer yet, but knows where to find it. It tells you what to look for.
Honestly uncertain
QP cannot verify this claim and says so directly. No confident guesses. No fabricated citations.
Post-quantum cryptography
Safe beyond the quantum threat horizon
Content hashing for all audit records
Classical digital signatures on every record
Post-quantum signatures. Safe against attacks that don't exist yet.
Dual signatures: if one algorithm is ever broken, the other still protects your records. No MD5, SHA-1, RSA, DES, or any deprecated algorithm, ever.
Three privacy layers
Audit detail decays, accountability remains
Record ID, type, timestamp, status, outcome. Proves what happened.
Anonymized reasoning, redacted tool calls. For operational review.
Complete reasoning, full prompts. AES-256-GCM encrypted. Auto-deleted.
Right to erasure: Layer 3 can be deleted while Layer 1 preserves the audit trail. Designed for GDPR, HIPAA, and financial recordkeeping.
Defense in depth
Six layers. If one fails, five remain.
Architectural isolation
Zero external APIs, no telemetry, no update checks, no analytics. Complete network isolation in air-gap mode.
Tool sandboxing
Workspace restrictions, path validation, pattern blocking. Tools can only access what they're explicitly allowed to.
Execution sandboxing
Containers with no network access, read-only filesystems, memory limits, and 30-second timeouts.
Approval gates
High-risk operations require human approval. Deploy, delete, shell commands. Configurable per-workflow.
Governance enforcement
Policy rules evaluated at runtime. Conditions matched against context. No action bypasses policy.
Cryptographic audit
Hash-chained Capsules with dual signatures. Replay verification. Compliance-ready export.
Compliance
Built for regulated industries.
QP's audit trail, privacy layers, and governance engine are designed to satisfy the controls required by these frameworks.
QP provides controls, audit trails, and evidence collection designed for these frameworks. Certification depends on your organization's implementation and assessment.