🛡️

The Core Principle

Memoria Orbis was built from the ground up on the principle that your second brain is highly sensitive personal data. We do not treat security as an afterthought. It is the core foundation of our platform.

01. Isolated Key Management (KMS)

Our infrastructure splits logic and cryptography physically. We run an isolated Key Management Service (KMS) on a secure, restricted Virtual Private Server (VPS).

02. Per-User Database Encryption (DEK)

We do not use a single "blanket" encryption key for the entire database. Instead, Memoria Orbis utilizes a sophisticated enveloped-key architecture.

03. Volatile In-Memory Decryption

When you log into your Web Dashboard or query your Vault in Discord:

Your encrypted DEK is securely passed via Transit Encryption to the KMS. The KMS unwraps the key and passes a volatile, short-lived transit-encrypted version back to the executing script. Your memories are decrypted only in the active RAM of that specific worker thread. The moment the webpage renders or the message is delivered, the process exits, wiping the unencrypted memory instantly.

04. Platform Context Hygiene

You may use Memoria Orbis in Direct Messages, Private Channels, and Public Servers. We strictly adhere to the following when you run the "Save Memory" command:

05. Zero Third-Party Telemetry

We do not use Google Analytics. We do not use third-party user tracking pixels. We do not farm your vault data for LLM training inputs behind your back. Your notes are dark data—visible only to you when authenticated.

Last updated: March 2026