AI Security & Verification

Early outputs from our AI security and verification programme.

AI Security posts

Sector AI Security

Understanding Data Center Power Delivery

We mapped the power delivery systems of AI data centers. Our diagram explores the data available at each stage, measurement techniques and signals of interest for AI security.

Sector AI Security

The Tray as a Bandwidth Boundary: Using a DPU as a Bandwidth Limiter

We used a DPU as a tray-level bandwidth limiter — an extra layer of security for protecting model weights, achieving near line-rate encryption with hardware-offloaded IPsec.

Sector AI Security

Network Taps - A First Test

A quick test installation of a 10G network tap for AI verification.

Sector AI Security

Network Tapping for AI Verification: A Technical Assessment

Verifying what a compute cluster is doing might involve "tapping" the network, e.g., copying network packets for recomputation. These notes explore what it might take to do that. This is an early version of a more expansive review on how to tap data center networks.

Join our team

We're a high-growth, world-changing startup. We are always hiring on a rolling basis for excellent talent in any role. Please apply if you're an ambitious top performer in any field or discipline, engineering or not.

Explore opportunities