Enterprise-Grade Security

Security Design

Communicating the security value to companies and researchers through robust architectural decisions.

πŸ›‘οΈ

Core Security Features

πŸ”
Feature 1

Hardware-backed Keys (TEE)

SKA is protected inside the Trusted Execution Environmentβ€”cannot be extracted.

βœ“
πŸ”‘
Feature 2

Software Key Used Only for Encryption

Prevents key exposure while enabling hybrid encryption model.

βœ“
πŸ”„
Feature 3

Nonce Freshness

Every request contains a unique, time-bound nonce.

βœ“
βœ…
Feature 4

Attestation Verification

Server checks certificate chain integrity, App ID, verified boot state, and challenge = nonce.

βœ“
πŸ›‘οΈ
Feature 5

Replay Protection

Nonces, session expiry, and signature verification ensure no requests can be reused.

βœ“
☁️
Feature 6

Server-Side Validation

All critical logic is verified on the backend, not on client.

βœ“

Multi-Layer Protection

Our protocol implements defense-in-depth security architecture

πŸ”’
TEE
Hardware Security
πŸ”
RSA + AES
Hybrid Encryption
βœ…
Attestation
Device Verification