Data Security for Every Developer

Cape empowers developers to easily encrypt data and process it confidentially. No cryptography or key management required.

Establishing a secure connection to the Cape Enclave

Verifying the integrity of the enclave

Processing the encrypted data

Move your mouse around here to generate coordinates. Imagine those movements as your private data.

The x,y coordinates of your mouse movements are encrypted in real-time. The data is encrypted directly client-side, in your browser.

Build something like this!

Try the Cape JavaScript SDK to build secure browser based applications.

Get started

Click “Generate Heatmap” to process the encrypted data

Protect Your Users' Data

Encrypt sensitive and regulated data at the point of entry and keep it protected even during processing

Protect Your Code

Deploy functions containing proprietary algorithms, models, and secrets while keeping your intellectual property confidential

What happens in Cape, stays in Cape

With Cape, your data and your code are encrypted in a way that can only be processed within one of Cape's secure enclaves. Cape’s secure enclaves are isolated compute environments, with no storage, no networking, and no shell access. No one can see what a secure enclave is processing. Once your function runs, the result is encrypted, and the enclave is destroyed, leaving no trace of the data or code even in memory.

Learn about enclaves

Built for Developers

Encrypt, Deploy, and Run

Cape empowers developers to build secure applications which protect the underlying data and code from the cloud.

Read the docs

Encrypt Data

Use Cape to easily encrypt data of any type including images, audio, video, and text. Cape handles encryption protocols and key management. Cape encrypt is fast and runs offline. Alternatively, integrate seamlessly with your own encryption service via Cape’s API.

$ cat data.txt
> Hello! How are you on this fine day?
$ cape encrypt -f data.txt
> cape:f00f3466fc73d2880088f5dd4f92b988cf5ab437b701afe63e874b1833539af453907c0a9b13d149e24c0357cc934bceda8817778756325a34b78ba3208788cab2cda67c3948c93ea7733d732545148742ba771517e51ad17c907fef98fe1455044d059d84d78aba314d18ed1269d1127cee8942201bf63a5230df56dce8bda5

Deploy from the CLI

Developers can deploy any type of function with Cape, from simple scripts to complex machine learning models. Your code is encrypted locally, and can only be processed within Cape’s secure enclave — protecting your IP, secrets, and methods.

$ cape deploy translation
> Success! Deployed function to Cape
> Function Name → translation
> Function Checksum → cbch8c9f7ac41138935810c3f45cd16d1abfbe15a37b1fc09a11dfbc3d44b447

Run from an SDK

Use Cape’s SDKs in Python, JavaScript, and Go to build Cape into your apps. The SDKs establish a direct, end-to-end encrypted connection to a dedicated, one-time-use secure enclave with cryptographic attestation. The enclave then processes your encrypted inputs, and returns encrypted results.

  • Python
  • JavaScript
import { Cape } from '@capeprivacy/cape-sdk';

const client = new Cape({
  authToken: 'eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9',
});
const result = await client.run({
  id: 'translation',
  data: 'cape:f00f3466fc73d2880088f5dd4f…'
})

console.log(result) // Comment allez-vous en ce beau jour?
Dave Kim's portrait
Dave KimCEO of Harbr, FinTech for Secured Finance
Harbr

Recognized by the Industry

Cape Privacy has recently been recognized in Gartner's 2021 AI Trust, Risk & Security Management (TRISM) Market Guide, 451 Group's Encryption-In-Use Report, Matt Turck's 2021 MAD Landscape, and was named a 2021 RSA Innovation Sandbox Finalist.