Security & Architecture

Security and governance brief

Comac does not access model weights, training data, or inference inputs or outputs. The architecture is proof-only. Operators retain full control of their systems and data.

What Comac does not access

Comac does not access, store, or process model weights, training data, fine-tuning datasets, inference inputs, inference outputs, or runtime payloads. The registry holds attestations and references only.

Comac does not execute models. It does not run inference. It does not ingest or retain operator data. Operators retain full control.

Independence and privacy-by-design

The registry is independent of any single vendor, operator, or deployment. It does not favour, endorse, or operate AI systems.

Privacy-by-design: Comac does not hold model or training data. Attestations are append-only; they are not edited or deleted. The registry holds a shared record without consolidating sensitive assets.

The registry can be inspected for its design and operation. Registry Access

Request a Discussion

Request a Discussion

For procurement, governance, or institutional inquiry.

Request a Discussion