Context
Current memory backends (e.g. Neo4j/Vector DBs) store embeddings and content as clear text.
In multi-agent deployments, isolating memory access is critical for user privacy and security.
Proposal
Implement an optional encryption layer for memory storage:
- Client-Side Encryption: Encrypt content before writing to DB.
- Key Derivation: Use derived keys from
Agent ID + Secrets (e.g. HMAC-SHA256).
- Opaque Content: Ensure embeddings remain searchable (if vector store supports encrypted vectors or trusted enclave), but raw content is opaque until decrypted by the authorized agent.
Impact
This would harden MemOS for enterprise and privacy-sensitive deployments, aligning with Zero Trust principles.