Compliance's Biggest Blindspot: Plaintext Access
There is a paradox at the heart of the compliance industry that almost no one talks about. Every system that enforces data protection compliance must, in the process of enforcing compliance, access the very data it is supposed to protect. Sanctions screening systems must read the names and identifiers of the parties involved in a transaction. Know Your Customer verification systems must read the identity documents and personal information of the customer. Anti-money laundering systems must read the transaction details, account balances, and customer histories. Risk scoring systems must read the financial data, behavioral data, and demographic data of the individuals being scored.
Each of these compliance operations is, by definition, a data exposure event. The compliance system reads the plaintext data, processes it, and makes a decision. During this process, the data exists in plaintext in the memory of the compliance system. It may be transmitted in plaintext across internal networks. It may be stored temporarily in plaintext in processing queues, caches, or temporary files. It may be logged in plaintext in the compliance system's audit trail.
The compliance industry has built an enormous infrastructure to protect sensitive data from unauthorized access. And then it requires that same data to be exposed, in plaintext, every time a compliance check is performed. This is the compliance industry's biggest blindspot, and it is hiding in plain sight.
The Scale of the Problem
To understand the magnitude of this blindspot, consider the volume of compliance operations that a typical financial institution performs. A mid-size bank processes millions of transactions per day. Each transaction must be screened against sanctions lists, which requires the compliance system to read the names, addresses, and identifiers of the parties involved. Each new customer must undergo KYC verification, which requires the compliance system to read identity documents, proof of address, and other personal information. Ongoing monitoring requires the compliance system to read transaction patterns, account balances, and behavioral data to detect suspicious activity.
Each of these operations exposes the data to the compliance system. Multiply the number of operations by the number of data elements in each operation, and the total volume of data exposure is staggering. A bank that processes ten million transactions per day and screens each transaction against a sanctions list exposes the names and identifiers of twenty million parties per day, because each transaction has at least a sender and a receiver. Add KYC operations, ongoing monitoring, risk scoring, and regulatory reporting, and the total number of data exposure events per day reaches into the hundreds of millions.
Each data exposure event is a potential security incident. If the compliance system is compromised, the attacker has access to every piece of data that the compliance system processes. If an insider at the compliance vendor has malicious intent, they have access to the data that flows through the compliance system. If the compliance system has a vulnerability, it can be exploited to exfiltrate the data it was designed to protect.
This is not a theoretical risk. Compliance systems are high-value targets precisely because they process large volumes of sensitive data in plaintext. An attacker who compromises a sanctions screening system gains access to the names, identifiers, and transaction details of every party whose transactions are screened. An attacker who compromises a KYC system gains access to identity documents, addresses, and personal information of every customer who has been verified.
Why This Blindspot Persists
The compliance industry's plaintext blindspot persists for three reasons. First, it has been accepted as an unavoidable architectural requirement. Compliance checks require comparing data against rules, lists, and models. Comparison requires reading the data. Therefore, the compliance system must have access to the plaintext data. This reasoning has been so universally accepted that few people question whether the underlying assumption is valid.
Second, the compliance industry focuses primarily on access controls rather than data exposure. The question is framed as "who has access to the data?" rather than "does the data need to be exposed at all?" Access controls determine which systems and individuals can read the data, but they do not prevent the data from being read by the systems that are authorized to access it. The compliance system itself is always authorized to read the data, because that is its function. The blindspot is not that unauthorized parties can read the data; it is that the authorized compliance process itself constitutes an exposure.
Third, there has historically been no alternative. Until recently, it was not technically feasible to perform compliance operations on encrypted data. You could not screen a name against a sanctions list without knowing what the name was. You could not verify an identity document without reading the document. You could not detect suspicious transaction patterns without seeing the transactions. The technical limitation was real, and the compliance industry designed its processes around this limitation.
The limitation is no longer real. Fully homomorphic encryption makes it possible to perform computations on encrypted data without decrypting it. This means that compliance operations can be performed on encrypted data, producing results without ever exposing the underlying data in plaintext. The question is no longer whether this is technically possible. The question is how quickly the compliance industry will adopt it.
How Compliance Works on Encrypted Data
Fully homomorphic encryption allows a system to perform mathematical operations on encrypted data and produce encrypted results. The system that performs the computation never has access to the plaintext data and never sees the result. Only the party that holds the decryption key can access the inputs and outputs.
For compliance operations, this means that the compliance system can execute its rules and models on encrypted data without ever reading the data. Consider sanctions screening. In a traditional system, the compliance engine reads the name of a transaction party in plaintext and compares it against a sanctions list. In an FHE system, the compliance engine receives an encrypted representation of the name and performs the comparison in the encrypted domain. The result, whether the name matches a sanctioned entity, is produced in encrypted form. The compliance engine never sees the name and never sees the result. The party that holds the decryption key, typically the originating institution, receives the encrypted result and decrypts it to determine whether the transaction should proceed.
The same approach applies to other compliance operations. KYC verification can compare encrypted identity documents against encrypted reference data. Anti-money laundering monitoring can evaluate encrypted transaction patterns against encrypted rules. Risk scoring can compute scores from encrypted financial data. In each case, the compliance operation is performed without the compliance system ever accessing the plaintext data.
This is not a marginal improvement. It is a fundamental change in the relationship between compliance and data protection. Instead of compliance requiring data exposure, compliance operates within the encryption boundary. The data remains encrypted throughout the compliance process. The compliance system enforces rules without reading values. The protection of the data is maintained during the exact process that was previously the largest source of exposure.
The Wire Transfer Example
To make this concrete, consider a wire transfer that must be screened for sanctions compliance. In the current process, the wire transfer details, including the sender name, receiver name, sender account, receiver account, amount, and routing information, are read by the sanctions screening system in plaintext. The system compares the names against the sanctions list and returns a match or no-match result. If there is a potential match, a compliance officer reviews the details, again in plaintext, to determine whether it is a true match or a false positive.
In this process, the wire transfer details are exposed at multiple points: when they enter the screening system, when the comparison is performed, when the result is generated, and when the compliance officer reviews a potential match. Each exposure point is a potential vulnerability. Each is a point where the data could be intercepted, logged inappropriately, or accessed by unauthorized parties.
Now consider the same wire transfer processed with FHE. The wire transfer details are encrypted before they enter the screening system. The encrypted data is compared against the sanctions list in the encrypted domain. The result is produced in encrypted form. If there is a potential match, the encrypted result is returned to the originating institution, which decrypts it for review by a compliance officer who has appropriate authorization and is within the institution's security boundary.
In this process, the wire transfer details are never exposed outside the originating institution's encryption boundary. The screening system processes the data without accessing it. The intermediate results are encrypted. The compliance decision is made based on encrypted computations. The data protection is maintained from the moment the wire transfer is initiated to the moment the compliance decision is made.
The Tokenization Trap
Some organizations attempt to address the plaintext exposure problem through tokenization. Tokenization replaces sensitive data elements with non-sensitive tokens that can be mapped back to the original data through a tokenization vault. The theory is that the compliance system operates on tokens rather than plaintext data, reducing exposure.
But tokenization does not eliminate plaintext exposure. It displaces it. The tokenization vault must have access to the plaintext data to create the tokens. The detokenization process must produce the plaintext data when the tokens need to be resolved. Any system that needs to perform operations that require the actual data values, such as fuzzy name matching in sanctions screening, must either detokenize the data, which re-exposes it, or use tokens that preserve enough structure to support the operation, which means the tokens themselves are sensitive.
Tokenization is a useful technique for reducing the footprint of plaintext data across an organization's systems. But it does not solve the compliance plaintext problem because the compliance operations themselves often require the actual data values, not tokens. Sanctions screening requires comparing actual names. KYC verification requires reading actual identity documents. Risk scoring requires computing on actual financial data. Tokenization moves the plaintext exposure around, but it does not eliminate it.
FHE is fundamentally different from tokenization because FHE allows computations on the actual data values in their encrypted form. The data does not need to be detokenized, decoded, or otherwise exposed before computation. The mathematical operations that implement the compliance logic operate directly on the ciphertext. This is not a reorganization of where the plaintext exists; it is an elimination of the plaintext from the computation entirely.
Attestation: Proving the Compliance Check Happened Correctly
Performing compliance checks on encrypted data is only half of the solution. The other half is proving that the compliance checks were actually performed and that they were performed correctly. This is where cryptographic attestation completes the picture.
Every compliance operation in the H33 pipeline produces an H33-74 attestation. The attestation cryptographically binds the proof to the specific computation: it records that a specific compliance check was performed on specific encrypted data at a specific time, and that it produced a specific encrypted result. The attestation is signed with three-family post-quantum signatures based on three independent hardness assumptions, making it tamper-proof against both classical and quantum attacks.
For compliance purposes, the attestation chain provides a verifiable record that every required compliance check was performed, even though the data was never exposed. A regulator can verify that sanctions screening was performed on every transaction by verifying the attestation chain. An auditor can verify that KYC checks were completed for every customer. An insurer can verify that compliance controls were continuously operational. None of them need access to the plaintext data. The attestation chain is self-proving.
This is a significant advancement over current compliance evidence. Today, compliance evidence consists of logs showing that a compliance system processed specific data. The evidence requires trust: trust that the compliance system operated correctly, trust that the logs are accurate, trust that the logs have not been modified. With cryptographic attestation, the evidence is mathematical proof that does not require trust. The proof is verifiable by any party, at any time, without access to the data or the system that generated it.
Regulatory Implications
The ability to perform compliance operations on encrypted data has significant regulatory implications. Current regulations require organizations to protect sensitive data while also requiring them to perform compliance operations that expose the data. Organizations navigate this contradiction by implementing access controls, monitoring, and logging around the compliance operations. They accept the plaintext exposure as a necessary cost of compliance and attempt to mitigate the associated risks.
As FHE-based compliance becomes technically and economically feasible, regulators may begin to view plaintext exposure during compliance operations as an avoidable risk rather than a necessary cost. This is already beginning to happen in the data privacy space, where regulations such as GDPR enshrine the principle of data minimization: organizations should process only the minimum amount of personal data necessary for the purpose. If compliance operations can be performed without accessing the plaintext data, then plaintext access during compliance operations is no longer necessary, and continuing to use plaintext-based compliance systems may become a data minimization violation.
This regulatory trajectory is particularly relevant for organizations that process data across jurisdictions. Cross-border data transfers are heavily regulated, and one of the primary concerns is that data transferred to another jurisdiction may be accessed by parties in that jurisdiction. If compliance operations, such as sanctions screening, can be performed on encrypted data without the screening service ever accessing the plaintext, the compliance operation does not constitute a data access event under most data protection frameworks. This could significantly simplify the compliance architecture for cross-border transactions.
The Economic Argument
Beyond the security and regulatory arguments, there is a compelling economic case for eliminating plaintext access in compliance operations. Every data exposure event creates liability. If the compliance system is breached, the organization is responsible for the data that was exposed. The cost of a breach that exposes compliance data, which typically includes the most sensitive customer information, can be enormous: notification costs, legal fees, regulatory fines, customer remediation, and reputational damage.
By eliminating plaintext access in compliance operations, organizations eliminate an entire category of breach exposure. If the compliance system is compromised but never had access to the plaintext data, the breach does not expose customer data. The encrypted data is useless to the attacker. The organization's liability is limited to the infrastructure compromise rather than the data exposure. This is a fundamentally different risk profile that has direct implications for cyber insurance premiums, regulatory posture, and customer trust.
The cost of FHE-based compliance operations is decreasing rapidly as the technology matures. H33's FHE pipeline processes compliance operations at production scale with latencies measured in microseconds per operation. The computational overhead of FHE, which was once prohibitive, is now within the range that makes it economically viable for high-volume compliance workloads. And the cost continues to decrease as hardware improves and algorithms are optimized.
For organizations that process large volumes of compliance operations, the economics are straightforward. The cost of plaintext exposure, measured in terms of breach liability, regulatory risk, and insurance premiums, exceeds the cost of FHE-based compliance. The break-even point is already here for many organizations, and it will shift further in favor of FHE as the technology continues to mature.
Closing the Blindspot
The compliance industry's plaintext blindspot is not a flaw in any specific compliance system. It is a consequence of an architectural assumption that has gone unchallenged for decades: the assumption that compliance requires reading the data. That assumption is no longer valid. Compliance operations can be performed on encrypted data using fully homomorphic encryption. Every operation can be attested with cryptographic proofs that are independently verifiable. The data can remain encrypted from the moment it enters the compliance pipeline to the moment the compliance decision is made.
This does not require organizations to rebuild their compliance programs from scratch. It requires them to adopt a different processing architecture for their compliance operations, one that eliminates the plaintext access that currently constitutes their single largest source of data exposure. The compliance rules, the regulatory requirements, the screening lists, the risk models, all of these remain the same. What changes is whether the compliance system needs to see the data it is processing. With FHE, it does not.
The compliance industry has spent decades building increasingly sophisticated controls around plaintext data access. Better access controls. Better monitoring. Better logging. Better incident response. Each of these is valuable. But none of them addresses the fundamental problem: the compliance operation itself is the exposure. The only way to close this blindspot is to eliminate the exposure. The only way to eliminate the exposure is to process the data in encrypted form. The technology to do this exists today, operates at production scale, and produces cryptographic proof of every operation.
The blindspot is visible. The solution is available. The question is not whether the compliance industry will close this gap, but how long it will take and which organizations will move first.
Eliminate Plaintext Exposure in Compliance
Schedule a technical demonstration to see how H33 performs compliance operations on encrypted data, producing verifiable H33-74 attestations without ever accessing the plaintext.
Schedule a Demo