Defense · intel · primes · cleared software

Air-gap is not a constraint.
It's the deployment.

kolm compiles your task into a single signed offline artifact: model, adapter, recipes, recall index, evals, manifest, signature. Crosses the diode on a flash drive. Runs unchanged on a tactical edge box, an analyst workstation, or behind an enclave boundary. kolm serve --mcp exposes it to the agents your operators already use. The frontier teacher you bring stays on the unclassified side. The artifact lives where the data lives.

01Why this matters

Cloud AI on classified work is
a non-starter.

ITAR. CUI. CMMC. Export-controlled model weights. Cross-domain transfer. Tactical edge with no link. The constraints are not a future risk, they are the operating environment. Frontier APIs do not get you past the diode.

Cross-domain
Zero egress

permitted from classified networks. kolm artifacts cross via signed sneakernet, verified on arrival.

Tactical edge
No link

guaranteed at the forward node. kolm runs offline, latency under 80 ms, no cloud dependency.

Provenance
Every byte

requires attestation. HMAC-chained manifest covers base model hash, adapter delta, recipe pack, recall index, evals.

02How it works

Compile on the low side.
Run on the high side.

The compile bridge runs on your unclassified network. The frontier teacher answers from there. The training corpus on the high side never leaves. The transfer artifact is a single signed file, content-addressed, verifiable end-to-end.

·

Open-weight bases only on Enterprise.

Llama, Qwen, Gemma, Phi, Mistral. No proprietary frontier weights cross the diode. The frontier model is the teacher, not the artifact.

·

Signed sneakernet path.

Artifact is one file. Manifest hash, base model hash, adapter hash, recipe hash, recall hash, eval hash, all signed in chain. Tamper anywhere, the chain breaks.

·

Edge-grade runtime.

Single binary, no service to monitor, no ports to open. Runs on a Jetson, an Intel NUC, or a ruggedized laptop. Detached operation by default.

03Use case

Reference deployment:
analyst assistant in an enclave.

A 2.1 GB artifact, base model plus 84 MB adapter, on a workstation inside an enclave. Indexes the analyst's own document set locally, drafts in the institution's voice, defers anything the verifier rejects. No external link, no cloud, no telemetry.

compile-bridge · low-side · region us-gov-vpc · open-weight base

From an unclassified gold set to a signed binary on the workstation.

Compile happens on the low side from an unclassified gold set. The artifact is signed, K-scored, written to media, walked across the diode, verified, deployed. The signature chain on the high side proves nothing was modified in transit.

01 · gather

Unclassified gold set

Scrubbed example pairs and held-out evals on the low side. Frontier teacher reachable through your egress proxy.

02 · compile

kolm compile

Verifier from examples, k-sample teacher, LoRA distill on open-weight base, recipe extract, recall index, sign.

03 · transfer

Signed sneakernet

Artifact written to write-once media. Hash chain printed for cross-domain ATO. Verified on arrival, signature matches, deploy.

04 · run

Detached operation

Workstation runs offline. Receipts log to local audit. Evidence packets exportable on demand for inspection.

04Compliance posture

What's done.
What's in flight.

Honest table. Same one we publish on /security for everyone else.

CMMC 2.0
Level 2 in flight 2027 Q1

Designed against NIST SP 800-171. Evidence packet shipped on Enterprise.

FedRAMP
Moderate roadmap 2027

Compile pipeline runs in a partition on AWS GovCloud or Azure Government. Per-tenant isolation enforced.

ITAR · EAR
Open-weight bases only

No proprietary frontier weights ship in the artifact. Open-weight base path keeps export classification clear.

Provenance
HMAC chain end-to-end

Every layer content-addressed. Manifest hash chain printed for cross-domain ATO. Tamper detection by construction.

Ship operator-side AI
that runs without a link.

Mail us with a one-line description of the task and the deployment environment. We'll come back with a 30-minute call, a reference artifact, and a path to a signed pilot.