Out-of-the-box benefits of using and deploying with dstack
Hardware-Enforced Isolation
Every workload runs inside a processor-level Trusted Execution Environment (TEE). The CPU encrypts memory on the fly, sealing it off from the operating system, hypervisor, and anyone with physical access.
Remote Attestation
DStack exposes a built-in attestation API that packages cryptographic evidence of the exact code, configuration, and TEE firmware your service is running on. Third parties can verify this proof before exchanging secrets or traffic.
Zero-Code-Modification Deployment
Container images that work in staging can be deployed directly to DStack with no SDK, no recompilation, no enclave-specific branches. The platform transparently adds the security layer at runtime.
Decentralized Key Management
Encryption keys are issued, rotated, and retired through a blockchain-backed coordination service. Key custodianship is distributed with no single vault to breach or subpoena.
Automated Certificate Lifecycle
TLS certificates are automatically generated, bound to specific enclaves, and renewed just-in-time before expiry. End-to-end encrypted channels with zero downtime and no surprise certificate failures.
Intuitive Web Dashboard
Replace command-line complexity with a real-time dashboard that shows enclave health, performance counters, and audit trails. Scale, pause, or revoke workloads with a click using role-based access control.