Security & Architecture

Security & Architecture Posture

Threat-model-driven, privacy-by-architecture. Built for hostile environments, human error, and institutional scrutiny.

Zero-PHI design Threat modeling Domain separation Non-punitive
Purpose

Why this posture exists

Security here is threat-model-driven, not a checklist. It is designed for hostile environments, human error, and institutional skepticism. Privacy is enforced by architecture, not promises.

Mindset

Security philosophy

  • Users make mistakes; browsers can be compromised; malicious actors exist.
  • Trust is enforced by design: minimize sensitive data, collect only what can be protected, prefer not to store at all.
  • The safest data is data we never see.
Separation

Domain separation (primary safeguard)

  • Identified Domain: may contain PHI; controlled by the physician; not transmitted by default.
  • De-Identified Domain: contains scrubbed/synthetic data; may be stored and processed; cannot be re-identified by PDI-Med.

This separation is foundational and non-optional.

Zero-knowledge

Zero-knowledge intent

  • Vaults are physician-controlled; keys are not known to PDI-Med.
  • PDI-Med cannot decrypt vault contents or reconstruct patients.
  • Recovery relies on identity verification and remapping, not access to prior secrets.
Threats

Threat modeling assumptions

  • Insider misuse, credential theft, data exfiltration attempts.
  • Aggregation abuse and “curious” reverse engineering.
  • Institutional pressure to expand scope beyond physician-first and privacy absolutes.

Features that expand attack surface without proportional benefit are rejected.

Federated

Federated intelligence safeguards

  • Minimum cohort sizes enforced.
  • Rare combinations suppressed.
  • Drill-down depth limited; no single-user extraction.
  • No comparative physician ranking.

Outputs are intentionally blunt at the edges to preserve safety.

Logging

Logging and monitoring

  • PDI-Med logs system health, security events, and abuse signals.
  • PDI-Med does not log PHI, raw clinical text, or patient identifiers.
  • Logs exist to defend the platform, not to surveil users.
Response

Incident response

  • Access may be temporarily restricted to contain suspected incidents.
  • Investigation prioritizes containment; vault remapping may be required.
  • Aggregate integrity is preserved; transparency preferred over concealment.
Browser

Browser-based reality

  • Hospital machines and policies vary; environments may be hostile.
  • Platform remains lightweight, non-persistent by default, resilient to session termination.
  • No privileged software install required.
Will not

What PDI-Med will not do

  • Store PHI “temporarily.”
  • Ask users to email data.
  • Troubleshoot using patient data.
  • Backdoor encryption.
  • Trade privacy for convenience.
Summary

Summary for security teams

PDI-Med minimizes risk by not collecting what it cannot protect, strictly separating domains, designing for failure, and treating privacy as an invariant. This is architectural restraint, not compliance theater.