Privacy & Trust

A system that holds your memories, experiences, and wisdom requires a higher standard of privacy — and a deeper kind of trust. alwyse is designed for both, from the architecture up.

Privacy principles

  • Your memory is yours. No ads. No resale. Your cognitive graph exists to serve you.
  • Opt-in capture. You choose which sources and sensors feed into alwyse. Nothing is captured without your consent.
  • Agent control. You choose which AI agents to activate. Each agent has a defined role and a trustworthiness report. No hidden capabilities.
  • Privacy boundaries. You can tell alwyse what it should know about and what it shouldn't. Work but not a personal relationship, or vice versa. Boundaries are explicit and enforced.
  • Local hosting option. Run alwyse on your own infrastructure for full data control and lower costs with local LLMs.

Apple ecosystem trust

alwyse leverages the Apple ecosystem's built-in security model for seamless, trusted integration between your devices and the alwyse backend. Authentication flows through Apple's secure identity infrastructure, and agents operate within the trust boundaries established by the device platform. Your iPhone, Mac, and Apple Watch connect to alwyse with the same security guarantees you rely on for everything else in the Apple ecosystem.

Relay and end-to-end encryption

For private deployments, alwyse's relay feature lets your apps reach your server from anywhere — without exposing your home network or opening ports. Traffic is encrypted end-to-end: TLS terminates on your machine, not on the relay. No intermediary can read your API calls, your memories, or your voice sessions.

What you can do anytime

  • Pause or stop capture
  • Revoke agent permissions
  • Disable or remove agents
  • Set privacy boundaries per domain
  • Review what agents accessed and changed
  • Ask "why?" and get a real answer
  • Export or delete your data

Provable privacy

When alwyse is hosted in the cloud, it utilizes confidential computing infrastructure in combination with modern on-device Trusted Platform technologies. Together, these provide a provable guarantee: no CVOYA employee, no cloud provider employee, and no enforcement agency can see your data.

How alwyse earns trust

Trust is built over time through demonstrated understanding, graceful error handling, and consistent respect for your corrections. At alwyse, trust is not a PDF — it's a product experience you can see and control.

Trustworthiness reports

Each AI agent comes with a trustworthiness report published by security experts. Before you rely on a helper, you can review what it does, what it can access, and how it was evaluated. Every part of the system is reviewed by external security experts.

Transparent agents

Each agent has a defined role so you know why it exists and what value it adds. Agents operate on an autonomy spectrum you control: some ask before acting, some act and report, some act silently. You tune this per agent and alwyse suggests adjustments over time as trust is established.

Ask "why?" and get a real answer

When alwyse surfaces something, you can ask why — and get a transparent explanation. When alwyse is wrong, you can correct it naturally, and corrections change future behavior, not just dismiss the current item.

"Trust isn't a PDF. It's a product experience you can see and control."

alwyse trust principle

Ongoing transparency

alwyse shows what agents accessed and what changed, so you can understand impact over time. The audit trail is always available — what did my agents do while I was asleep?

Trust through correction

alwyse will be wrong sometimes. It will misread a pattern, surface something irrelevant, or misunderstand what you value. This is acceptable because the system listens, learns, adapts, and is transparent about why it did what it did.

Private deployment with relay

Run alwyse on your own infrastructure for full data control. The relay feature lets you reach your private instance from anywhere while keeping traffic encrypted end-to-end. TLS terminates on your machine — the relay only sees encrypted bytes.

Learn about private deployment →