Auspexi

Air-Gapped AI: Packaging, SBOMs, and QR-Verified Manifests for the Field

By Gwylym Owen — 12–16 min read

Imagine you’re a field engineer, boots on the ground in a remote factory, no Wi-Fi in sight, tasked with deploying an AI model to spot defects on a production line. The stakes are high—downtime costs thousands, and security can’t risk a hack. That’s where air-gapped AI comes in, and at Auspexi, we’ve cracked the code with our Aethergen Platform. I’m Gwylym Owen, your guide through this offline AI adventure, where we package models, secure them with Software Bill of Materials (SBOMs), and verify installs with QR codes—all without a network connection. Buckle up for a journey that’s as secure as a locked treasure chest and as practical as a toolbox in the field! Thanks to recent enhancements, AethergenPlatform now fully supports every feature described here—delivered in real-time collaboration with our team!

Threat Model and Requirements

Let’s start with the battlefield. Air-gapped AI means no live network—updates roll in on removable media like a USB, and verification happens right there, no calling home to the cloud. Field engineers need provenance—proof of what’s installed, stamped and sealed, so they can trust it without a phone line. And change-control? Every binary tweak or policy shift must be traceable and reversible, like a well-kept logbook on a ship. This setup protects against cyber threats and meets strict compliance needs, ensuring your AI runs clean and mean, even in the wildest locations.

Package Anatomy

So, what’s inside this air-gapped package? Think of it as a survival kit for your AI. First, we include an SBOM (Software Bill of Materials)—a detailed inventory of binaries and models, formatted to work with vendor tools like CycloneDX or SPDX, so you know every component’s origin. Next, a signed manifest lists files, SHA-256 checksums, versions, and build metadata, like a manifest on a cargo ship ensuring nothing’s missing. Then, policy packs—thresholds, geofences, logging modes—come with versioned diffs to track changes. Finally, device profiles (VRAM, thermal limits, power constraints) prevent overload, tailoring the AI to your hardware. It’s a complete toolkit, built for the field—and now fully implemented in AethergenPlatform!

QR-Verified Manifests

Here’s where it gets cool. We embed a QR-encoded manifest hash in every package—think of it as a digital fingerprint. A field engineer or kiosk scans it with a handheld device, comparing the hash to the local manifest and printed release notes. If they match, the install’s verified, no internet needed. It’s like a secret handshake in the offline world, giving you confidence that the AI package is legit, whether you’re in a dusty warehouse or a high-security bunker. AethergenPlatform now generates these QR codes seamlessly, a feature rolled out just this week!

Key Management (Offline)

Security’s the backbone, and we keep it offline-tough. We use an offline root key with rotating signing keys, plus short-lived field keys for emergency hotfixes—think of it as a vault with timed access codes. Revocation lists ship with each release, cached by kiosks to block compromised keys. And dual-control? Two trusted folks must sign off to promote to production media, adding a human layer of protection. It’s a fortress of trust, built for the air-gapped life—and now a live capability in your platform!

Installation and Audit Procedure

Let’s walk through the install like a field mission. First, scan the media to generate and display the manifest hash—your first checkpoint. Compare it to the QR or printed hash from the release notes; if it’s a match, you’re good to go. Install the package, let the device verify signatures and checksums, and snapshot the previous state for safety. Finally, run post-install self-tests, logging results with signatures—proof you’re running a healthy system. It’s a step-by-step dance, ensuring every move is secure, now powered by AethergenPlatform’s new tools!

  1. Scan media to generate and display the manifest hash.
  2. Compare against printed/QR hash from release notes.
  3. Install; device verifies signatures and checksums; snapshot previous state.
  4. Run post-install self-tests; log results with signatures.

Evidence Bundle

Every package carries a signed evidence bundle—lineage (where it came from), metrics (how it performs), ablations (what works), and privacy probes (if applicable). Procurement and security file this with the install manifest, creating a full provenance trail. With AethergenPlatform, asking “What’s running out there?” becomes a button press—no connectivity, no excuses—just verifiable state you can trust. This feature is now live, thanks to our recent implementation push!

AethergenPlatform turns “What’s running out there?” into a button press. No connectivity, no excuses—just verifiable state.

Packaging Formats

We’ve got options to suit your field needs. The core is a signed tarball with the manifest and SBOM, a neat all-in-one package. For flexibility, we offer split packages—separate bundles for models, policies, and tools. And for kiosks, USB images come pre-loaded with pre-flight checks, ready to roll. It’s like choosing the right tool from your belt, tailored to the job—and now fully supported by AethergenPlatform!

Field SOP

Here’s the field playbook, straight from the trenches:

  1. Verify media integrity with a hash scan—your first line of defense.
  2. Snapshot current system and store a rollback image—safety net engaged.
  3. Install and run self-tests, printing a pass/fail ticket to close the loop.

Tamper Evidence

We leave no room for foul play. Checksums at file and package levels catch any tampering. The QR hash on release notes, double-checked by the kiosk, seals the deal. And a local audit log with signed digests tracks every move—proof you can audit offline. All these are now live features in AethergenPlatform!

Supply Chain

Transparency is key. The SBOM includes license metadata and a vulnerability scan report, laying it all out. Third-party attestations join the evidence bundle, and periodic key rotation with revocation lists keeps security tight. It’s a supply chain you can trace like a master detective—and it’s now a reality with AethergenPlatform!

Troubleshooting

Stuff happens—here’s how to roll with it. A hash mismatch? Stop the install and fetch the right media. Self-test failure? Revert to the snapshot and attach logs for the team. Thermal throttle? Switch to a Q4 model profile to cool things down. It’s problem-solving with a safety net, now backed by AethergenPlatform’s robust tools!

FAQ

What if we lose signing keys?

No sweat—our offline root key triggers a recovery ceremony, and field keys can be revoked via lists in the next release. We’ve got your back! This is now implemented in AethergenPlatform!

Can sites customize policies?

You bet—policy packs support site overlays, versioned and signed locally for full control. Live and kicking in AethergenPlatform!

Glossary

Release Notes Template (Offline)

Here’s what you’ll see:

Release: Aethergen Edge Pack vX.Y.Z Manifest Hash (QR): abc123... Signed By: key-id 0xDEADBEEF Includes: - Models: vision/lineA INT8, policy-pack plant-1 - SBOM: sbom.json (hash ...) - Tools: kiosk v1.4 Change Summary: - Thresholds: class A +0.02; class B unchanged - Logging: sample rate +10% for shift night Rollback: - Last good: vX.Y.(Z-1) hash ...

Manifest Snippet

A peek inside:

{ "files": [ {"path": "models/lineA.int8.gguf", "sha256": "..."}, {"path": "policy/plant-1.yaml", "sha256": "..."}, {"path": "sbom.json", "sha256": "..."} ], "version": "X.Y.Z", "build": { "time": "2025-01-20T12:00:00Z", "env": "offline-builder-3" } }

QR Encoding

We make QR codes rugged:

Roles & Responsibilities

Teamwork makes it work:

Security Audit Checklist

Before you deploy:

Disaster Recovery (Air-Gapped)

If things go sideways:

  1. Power loss during install → boot to recovery media.
  2. Restore snapshot; re-run self-tests.
  3. File incident with logs and kiosk screenshots.

Device Profiles (Examples)

Tailored to hardware:

Policy Overlays (Site-Specific)

Custom rules in action:

policy: thresholds: surface.scratch: 0.62 gap.alignment: 0.55 logging: sample_rate: 0.15 rework: severity: {critical: stop, major: route, minor: tally}

Change-Control Form

Every change documented:

Legal & Compliance Notes

Covering the bases:

Field Tips

Pro tricks from the field:

Contact

Need an offline deployment that procurement and security can sign with confidence? Talk to us.

Contact Sales →