Wallet Security Details

  • Non-custodial Architecture: Users maintain control of their private keys

  • TEE Implementation: Secure execution environment for sensitive operations

  • Multi-signature Requirements: Additional security for high-value transactions

  • Key Recovery Process: Secure but usable recovery mechanisms

Last updated