Back to blog
Architecture Dec 28, 2025 6 min read

Non-Custodial Architecture: Why You Don't Have to Trust Us

Author: Dr. Rajesh Kumar. Edited for clarity and security accuracy.

Article highlights
  • Time-locked delivery and trust-minimized storage.
  • Auditability, encryption, and policy enforcement.
  • Practical guidance for secure exam operations.
Security focus Readable summary

The Trust Problem

Every centralized exam security system asks institutions the same question: "Do you trust us with your data?"

The honest answer should be: "Why should we?"

A centralized company can be hacked, subpoenaed, corrupted, or simply go out of business. Your exam papers are hostage to their security practices and business decisions.

Introducing Non-Custodial Design

T.A.L.A. uses a non-custodial architecture, meaning:

  • We never hold your keys. Encryption keys are generated and held by your institution.
  • We never access your data. Papers are encrypted before leaving your system.
  • We never delete your data. Only you can decrypt and remove it.
  • We serve transactions, not data. Our role is to facilitate blockchain operations, not to be a custodian.

How It Works

The architecture is surprisingly elegant:

  1. Key Generation: Your institution generates encryption keys locally using secure randomness.
  2. Encryption: Papers are encrypted using AES-256-GCM with your keys, before upload.
  3. Upload: Encrypted papers are sent to T.A.L.A.'s servers (now they're gibberish to us).
  4. Blockchain Anchor: A cryptographic hash of the encrypted paper is stored on Polygon Amoy.
  5. Access: When authorized, your key is used to decrypt the paper client-side.
  6. Deletion: You can destroy your keys anytime, rendering all data permanently inaccessible (even to us).

Why Non-Custodial Matters

Security: If T.A.L.A. is compromised, your data remains encrypted.

Compliance: You remain the data controller under GDPR, FERPA, and CCPA. We're just processors.

Sovereignty: Your data is truly yours. We can't sell it, scan it, or use it for AI training.

Longevity: Even if T.A.L.A. shuts down, your papers remain accessible on the blockchain using your keys.

The Trade-off

Non-custodial design means you bear some responsibility:

  • You must securely generate and store your keys
  • Lost keys = lost access (we can't recover them)
  • Key compromise = data compromise (keep them safe)

T.A.L.A. provides tools to make this easy: hardware wallet integration, HSM support, and key backup mechanisms.

The Future: Self-Sovereign Data

Non-custodial architecture is the foundation for true data sovereignty in education. Students own their transcripts. Institutions own their exams. No middleman needed.

Share

Keep exploring the T.A.L.A. blog

More research notes, release breakdowns, and security guidance.

Back to blog
T.A.R.A. - Trustworthy AI Response Assistant
Non-Custodial Architecture: Why You Don't Have to Trust Us | T.A.L.A. Blog