BenchmarksStack Ranking
APIsPricingDocsWhite PaperTokenBlogAboutSecurity Demo
Log InGet API Key
← Digital SCIF

Security Transparency

Full disclosure of the Digital SCIF security architecture. Threat model, custody model, device trust, policy engine, key rotation, recovery adversary model, and audit architecture.

The system is designed under the assumption that both client and server environments may be partially adversarial. 82 tests validate correctness under adversarial, concurrent, and failure conditions.
Execution layer owns full state transition: key → policy → signing → broadcast → confirmation → reorg recovery. This system does not just sign transactions. It manages UTXO/nonce state, broadcast with retry, chain-specific finality, and failed transaction recovery.
82 Tests Passing Zero Errors 3 PQ Families Open Source Client FHE Biometric

Custody Model

This is not a seed-based wallet. Recovery depends on encrypted vault + guardian shares, not mnemonic regeneration of keys.
ScenarioRecovery Path
Lost device, have mnemonicMnemonic → vault key → decrypt vault backup
Lost mnemonic, have deviceVault still unlockable via biometric on device
Lost bothk-of-n guardians reconstruct vault key
Guardian compromiseRemaining guardians + mnemonic = sufficient

Threat Model

1. Malicious Server

CAN: deny service, delay responses, return stale data
CANNOT: decrypt biometrics (FHE), decrypt vault (key client-side), forge attestations (3 PQ private keys required)

2. Malicious Client (JS tampering, WASM injection)

CAN: modify displayed data, exfiltrate mnemonic during display, substitute signing payloads
Enforced: CSP headers + WASM integrity hash in production builds. Subresource integrity on all script loads. Server-side payload validation before attestation.

3. Compromised Device

CAN: capture biometric before FHE encryption, exfiltrate vault key from memory
Mitigated: device attestation (TPM/Secure Enclave/WebAuthn), quarantine + revocation, biometric bound to device state

4. RPC/Provider Manipulation

CAN: return false balances, fake confirmations, censor transactions
Mitigated: multiple independent RPCs, cross-verification, reorg detection (block hash tracking)

5. Evil Twin WiFi

CAN: intercept all network traffic, MITM all connections
Mitigated: CCRA NetworkDna fingerprinting detects evil twins. Wallet refuses ALL operations when detected. PQ VPN required for Cold tier.

6. Biometric Spoof (17 attack types)

CAN attempt: printed photo, digital screen, 3D mask, mannequin, deepfake, video replay, voice cloning, gait mimicry
Mitigated: anti-spoofing runs in FHE domain (before decryption). k-of-n collective authority — no single party holds decryption key.

7. Replay + Rollback Attacks

CAN: replay signed transactions on different chains
Mitigated: chain_id in H33-74 commitment, nonce/UTXO tracking, timestamp + nonce in every attestation

8. Guardian Collusion

k guardians CAN reconstruct vault key (by design)
Mitigated: time-delayed recovery (anti-theft window), owner notification, geographic distribution, 72-hour cooldown on guardian changes

9. Chain Reorg

CAN: reverse confirmed transactions below finality threshold
Mitigated: per-chain confirmation policy (BTC: 3, ETH: 12, SOL: 1), reorg detection + transaction replay

10. Side-Channel

CAN: timing analysis on WASM PQ signing (FALCON is variable-time)
Mitigated: Dilithium (constant-time) runs client-side. FALCON + SPHINCS+ run server-side. Server-side is protected hardware.

Security Gate — Tier Requirements

Security Gate enforces runtime invariants across key usage, device identity, and execution context. All cryptographic operations are blocked unless policy, device attestation, and vault state are valid.
CheckHotWarmCold
CCRA connection score≥ 0.7≥ 0.7≥ 0.9
Device attestedRequiredRequiredRequired
Binary integrity (ZK-Verify)RequiredRequired
PQ VPN activeRequired
ZK-Phish scanningRequired
BotShield tokenRequiredRequiredRequired
Evil twin detectedBlocks ALL tiers immediately

Policy Engine

All actions are evaluated against policy before execution, not just cryptographic validity.

Device Trust Model

Biometric verification is bound to trusted device state. A valid biometric on an untrusted device is not sufficient.

Key Rotation

Keys are not static. The system supports forward-secure rotation without breaking prior attestations.

Recovery Resilience

No single party — including the server — can recover a wallet. Recovery requires quorum and cannot be bypassed. Recovery is resilient to loss, compromise, and adversarial coordination, not just happy-path reconstruction.
ScenarioOutcome
Single guardian lostSystem continues. Remaining k-1 of n-1 still meets threshold.
Guardian compromisedOne share alone is useless (Shamir requires k shares). Rotate guardian.
k guardians colludeCAN reconstruct vault key (by design). Mitigated by time delay + owner notification.
All guardians lostMnemonic + device still operational. Re-enroll new guardians.
Theft attempt via recovery72-hour time delay + owner notification + geographic lock
Death / legal triggerEstate execution: dormancy detection (120 days) + beneficiary distribution

Audit Architecture

Every action is both provable and observable. Every audit entry is anchored to an H33-74 attestation, making logs independently verifiable rather than self-reported.

Open Source

The wallet client is fully open source. Every line of code that touches your keys is auditable.

Test Coverage

82 tests validate correctness under normal, adversarial, and failure conditions:

System Boundary

ComponentHoldsDoes Not Hold
Client (WASM/native)Decrypted state post-unlock. Mnemonic during display. Signing keys in memory.Nothing persisted in plaintext. Zeroized on lock/drop.
ServerEncrypted vault blobs. FHE-encrypted biometric templates. H33-74 attestation keys.Plaintext keys. Plaintext biometrics. Vault encryption key. Mnemonic.
GuardiansIndividual Kyber-encrypted Shamir shares of the vault key.Raw vault key (requires k-of-n quorum). Any signing keys.
Chains32-byte H33-74 commitments. Public key commitments (Token-C).Trust decisions. Key material. Biometric data.
H33-74 AttestationsSource of truth. Independently verifiable. Three PQ signatures per attestation.Revocable state. Attestations are immutable once minted.
Chains anchor commitments, not trust. The server processes ciphertext, not secrets. Guardians hold shares, not keys. Attestations are the source of truth.
Back to Digital SCIF View Source
144 patent claims pending · H33.ai, Inc. · #19/645,499