Enterprise-Grade Security
Security Design
Communicating the security value to companies and researchers through robust architectural decisions.
π‘οΈ
Core Security Features
π
Feature 1
Hardware-backed Keys (TEE)
SKA is protected inside the Trusted Execution Environmentβcannot be extracted.
β
π
Feature 2
Software Key Used Only for Encryption
Prevents key exposure while enabling hybrid encryption model.
β
π
Feature 3
Nonce Freshness
Every request contains a unique, time-bound nonce.
β
β
Feature 4
Attestation Verification
Server checks certificate chain integrity, App ID, verified boot state, and challenge = nonce.
β
π‘οΈ
Feature 5
Replay Protection
Nonces, session expiry, and signature verification ensure no requests can be reused.
β
βοΈ
Feature 6
Server-Side Validation
All critical logic is verified on the backend, not on client.
β
Multi-Layer Protection
Our protocol implements defense-in-depth security architecture
π
TEE
Hardware Security
π
RSA + AES
Hybrid Encryption
β
Attestation
Device Verification