Vector Lock Protocol

* hardware‑anchored identity

* vulnerability remediation

* encrypted data flows

* isolated compute boundaries

* post‑quantum cryptography