Identity replaces keys. Everything builds on that.

Replace static API keys with cryptographic identities. No downtime, zero trust by default, information-theoretic security for machines.

3 steps
create → connect → send
< 2 min
Setup Time
0 sec
Downtime
Get Started See Migration Guide
💡

The Pattern

create → connect → send

Whether it's seed custody (Xecret) or email security (Xail), the flow stays the same.

Choose Your Entry Point
Three paths into identity infrastructure. Same 3-step flow. Pick the problem you're solving today.
🔗
PATH 1: Replace API/SSH Keys

xLink

Identity-Based Connections
Setup Time
< 2 minutes
🔑 Zero Key Management Required

Every AI agent gets cryptographic identity (DID). No secrets to rotate. No keys to store. No sprawl to manage.

AI Agents Are Breaking API Key Management

AI agents make 100× more API calls than humans. Your key infrastructure can't scale. What breaks:

1
Rotation Chaos
Quarterly rotation × 1,000 agents = operational nightmare
2
Rate Limiting Breaks
Per-key limits fail when one AI spawns 1,000 workers
3
Audit Explosion
"Which agent made this call?" becomes unanswerable
4
Revocation Impossible
Kill one rogue agent → rotate keys for all 1,000 others

Every AI agent gets cryptographic identity (DID). No rotation. No rate limits. No audit gaps. Scales to millions of connections.

Already have API keys? Run PRIVATE.ME parallel. Zero downtime. Shift traffic at your pace.

See xLink Documentation →
🏢
PATH 2: On-Prem + Billing Control

Xpass (Full Control)

Data Sovereignty Without Trade-Offs
Migration Time
1-2 hours
The Impossible Contradiction
Enterprises demand on-prem AI (HIPAA, FedRAMP, ITAR). Vendors need billing control. Traditional choice: cloud or compliance. $150B+ in blocked deals.
What Changes
  • Split code into 2 shares (XorIDA)
  • Share 1 → Customer infrastructure
  • Share 2 → Vendor-controlled delivery
  • Payment stops → Share 2 denied
See Full Control Documentation →
🆔
PATH 3: The Foundation Layer

xID (Identity Infrastructure)

Both xLink and Xpass build on xID — the identity layer that makes keys obsolete. If you're building identity infrastructure directly, start here.

DID Generation
~50 microseconds

Ephemeral Identity

Per-verifier DIDs from XorIDA-split master seed. Cross-repo unlinkable. eIDAS 2.0 compliant.

Self-Converging Identity

K-of-N threshold from 8 signal types. ISO 24745 cancelable biometrics. No seed at rest.

AI Agent Identity

Verifiable DID per agent. No static tokens. Cryptographic accountability.

See xID Documentation →
QUICK COMPARISON
xLink Xpass xID
Setup Time < 2 min 1-2 hours ~50µs per DID
Replaces API/SSH keys License servers Static identifiers
Use Case M2M auth On-prem billing Identity layer
Migration Run alongside Code splitting Foundation
3-Step Flow

All three paths use the same 3-step flow: create identity → connect → execute.
The difference is your starting point and what you're replacing.

💡 Remember

create → connect → send

Three steps. Every system. No exceptions.

Real-World Impact
From seed custody to email security — identity infrastructure in production.
Patent US 11,972,000 B2

Xecret: Seed Custody

Hardware wallet seed split across 3 email addresses. Threshold reconstruction (2-of-3). Lose your phone → recover via email. Lose one email → still access your wallet.

Information-theoretic security. One share alone reveals zero bits. HMAC verification before reconstruction. No custodian, no single point of failure.

Built on PRIVATE.ME

Xail: Email Client

Lightweight email client with split-channel secure messaging. Regular email (1 address) or secure Xail-to-Xail (2+ addresses, threshold-protected). Both modes coexist in one inbox.

Visual security tiers. Blue border (2-of-2 secured). Green border (2-of-3 secured + fault tolerant). Enterprise compliance for regulated industries.

💡 The Pattern

create → connect → send

Whether it's seed custody (Xecret) or email security (Xail), the flow stays the same.

Team
Executive leadership and strategic advisors.
AJ Esmailzadeh

AJ Esmailzadeh

Founder

Founder and president of Private.Me and Private.Co. Creator of revolutionary patented cloud-based platform for data dispersal where the end user is the only trusted party.

Jacques Kempin

Jacques Kempin

CEO

Innovator and entrepreneur. Co-Founded VeePee, a Cloud Solutions Service Provider. Created three secure file sharing applications. Former teacher at ENSAD and University of Paris V. Partner at Zeno Capital.

Paul Hershenson

Paul Hershenson

Chief Technical Officer

Co-Founder of Art & Logic, Inc. Grew company to 75 developers serving over 900 clients including Apple, Google, Motorola, Disney, and SpaceX. Pioneer in digital audio editing techniques.

Dr. Stan Stahl

Dr. Stan Stahl

Chief Information Security Officer

Pioneer in information security since 1980. Secured teleconferencing at the White House, databases inside Cheyenne Mountain, and nuclear weapons communications. President of Citadel Information Group.

David Lam

David Lam, CISSP

Chief Information Officer

30+ years of IT experience with 27 years in Information Security. Focus on securely managing information across enterprise systems.

Ted Harrington

Ted Harrington

Advisor

Strategic advisor on cybersecurity and business development. Expertise in enterprise security architecture and go-to-market strategy.

Robert Neivert

Robert Neivert

Advisor

CEO for two venture-funded startups. Led startups in mobile and enterprise software. Four successful company exits. Leadership positions in products, marketing, and operations.

Tim Toohey

Tim Toohey

Advisor

Chief Privacy Officer for Private.me. Partner and Head of Cyber, Privacy and Data Security Team at Morris Polich & Purdy LLP. Author on privacy and data protection.

S

Ask Sol

Platform Sales Agent

Questions about xLink, Xpass, xID, pricing, implementation, or compliance? Ask me anything about the PRIVATE.ME platform.

Sol can make mistakes. Verify important information.