By Gwylym Owen — 12–16 min read
Imagine you’re a field engineer, boots on the ground in a remote factory, no Wi-Fi in sight, tasked with deploying an AI model to spot defects on a production line. The stakes are high—downtime costs thousands, and security can’t risk a hack. That’s where air-gapped AI comes in, and at Auspexi, we’ve cracked the code with our Aethergen Platform. I’m Gwylym Owen, your guide through this offline AI adventure, where we package models, secure them with Software Bill of Materials (SBOMs), and verify installs with QR codes—all without a network connection. Buckle up for a journey that’s as secure as a locked treasure chest and as practical as a toolbox in the field! Thanks to recent enhancements, AethergenPlatform now fully supports every feature described here—delivered in real-time collaboration with our team!
Let’s start with the battlefield. Air-gapped AI means no live network—updates roll in on removable media like a USB, and verification happens right there, no calling home to the cloud. Field engineers need provenance—proof of what’s installed, stamped and sealed, so they can trust it without a phone line. And change-control? Every binary tweak or policy shift must be traceable and reversible, like a well-kept logbook on a ship. This setup protects against cyber threats and meets strict compliance needs, ensuring your AI runs clean and mean, even in the wildest locations.
So, what’s inside this air-gapped package? Think of it as a survival kit for your AI. First, we include an SBOM (Software Bill of Materials)—a detailed inventory of binaries and models, formatted to work with vendor tools like CycloneDX or SPDX, so you know every component’s origin. Next, a signed manifest lists files, SHA-256 checksums, versions, and build metadata, like a manifest on a cargo ship ensuring nothing’s missing. Then, policy packs—thresholds, geofences, logging modes—come with versioned diffs to track changes. Finally, device profiles (VRAM, thermal limits, power constraints) prevent overload, tailoring the AI to your hardware. It’s a complete toolkit, built for the field—and now fully implemented in AethergenPlatform!
Here’s where it gets cool. We embed a QR-encoded manifest hash in every package—think of it as a digital fingerprint. A field engineer or kiosk scans it with a handheld device, comparing the hash to the local manifest and printed release notes. If they match, the install’s verified, no internet needed. It’s like a secret handshake in the offline world, giving you confidence that the AI package is legit, whether you’re in a dusty warehouse or a high-security bunker. AethergenPlatform now generates these QR codes seamlessly, a feature rolled out just this week!
Security’s the backbone, and we keep it offline-tough. We use an offline root key with rotating signing keys, plus short-lived field keys for emergency hotfixes—think of it as a vault with timed access codes. Revocation lists ship with each release, cached by kiosks to block compromised keys. And dual-control? Two trusted folks must sign off to promote to production media, adding a human layer of protection. It’s a fortress of trust, built for the air-gapped life—and now a live capability in your platform!
Let’s walk through the install like a field mission. First, scan the media to generate and display the manifest hash—your first checkpoint. Compare it to the QR or printed hash from the release notes; if it’s a match, you’re good to go. Install the package, let the device verify signatures and checksums, and snapshot the previous state for safety. Finally, run post-install self-tests, logging results with signatures—proof you’re running a healthy system. It’s a step-by-step dance, ensuring every move is secure, now powered by AethergenPlatform’s new tools!
Every package carries a signed evidence bundle—lineage (where it came from), metrics (how it performs), ablations (what works), and privacy probes (if applicable). Procurement and security file this with the install manifest, creating a full provenance trail. With AethergenPlatform, asking “What’s running out there?” becomes a button press—no connectivity, no excuses—just verifiable state you can trust. This feature is now live, thanks to our recent implementation push!
AethergenPlatform turns “What’s running out there?” into a button press. No connectivity, no excuses—just verifiable state.
We’ve got options to suit your field needs. The core is a signed tarball with the manifest and SBOM, a neat all-in-one package. For flexibility, we offer split packages—separate bundles for models, policies, and tools. And for kiosks, USB images come pre-loaded with pre-flight checks, ready to roll. It’s like choosing the right tool from your belt, tailored to the job—and now fully supported by AethergenPlatform!
Here’s the field playbook, straight from the trenches:
We leave no room for foul play. Checksums at file and package levels catch any tampering. The QR hash on release notes, double-checked by the kiosk, seals the deal. And a local audit log with signed digests tracks every move—proof you can audit offline. All these are now live features in AethergenPlatform!
Transparency is key. The SBOM includes license metadata and a vulnerability scan report, laying it all out. Third-party attestations join the evidence bundle, and periodic key rotation with revocation lists keeps security tight. It’s a supply chain you can trace like a master detective—and it’s now a reality with AethergenPlatform!
Stuff happens—here’s how to roll with it. A hash mismatch? Stop the install and fetch the right media. Self-test failure? Revert to the snapshot and attach logs for the team. Thermal throttle? Switch to a Q4 model profile to cool things down. It’s problem-solving with a safety net, now backed by AethergenPlatform’s robust tools!
No sweat—our offline root key triggers a recovery ceremony, and field keys can be revoked via lists in the next release. We’ve got your back! This is now implemented in AethergenPlatform!
You bet—policy packs support site overlays, versioned and signed locally for full control. Live and kicking in AethergenPlatform!
Here’s what you’ll see:
Release: Aethergen Edge Pack vX.Y.Z
Manifest Hash (QR): abc123...
Signed By: key-id 0xDEADBEEF
Includes:
- Models: vision/lineA INT8, policy-pack plant-1
- SBOM: sbom.json (hash ...)
- Tools: kiosk v1.4
Change Summary:
- Thresholds: class A +0.02; class B unchanged
- Logging: sample rate +10% for shift night
Rollback:
- Last good: vX.Y.(Z-1) hash ...
A peek inside:
{
"files": [
{"path": "models/lineA.int8.gguf", "sha256": "..."},
{"path": "policy/plant-1.yaml", "sha256": "..."},
{"path": "sbom.json", "sha256": "..."}
],
"version": "X.Y.Z",
"build": {
"time": "2025-01-20T12:00:00Z",
"env": "offline-builder-3"
}
}
We make QR codes rugged:
Teamwork makes it work:
Before you deploy:
If things go sideways:
Tailored to hardware:
Custom rules in action:
policy:
thresholds:
surface.scratch: 0.62
gap.alignment: 0.55
logging:
sample_rate: 0.15
rework:
severity: {critical: stop, major: route, minor: tally}
Every change documented:
Covering the bases:
Pro tricks from the field:
Need an offline deployment that procurement and security can sign with confidence? Talk to us.