Security Overview
SSP's Security-First Approach
π‘οΈ Core Security Principles
1. True 2-of-2 Multisignature
2. Zero-Knowledge Architecture
3. Self-Custody First
4. Defense in Depth
π Security Layers
Layer 1: Runtime Security
Layer 2: Device Security
Layer 3: Cryptographic Security
Layer 4: Communication Security
Layer 5: Network Security
π Encryption Implementation
Private Key Encryption
Key Derivation (BIP48)
π‘οΈ Attack Resistance
Protected Against
Potential Risks (Mitigated)
π Security Audits
Professional Security Audits
π SSP Wallet, Key, and Relay Audit (2025)
π Smart Contracts Audit (2025)
π SDK Security Audit (2025)
π¨ Security Best Practices for Users
Essential Practices
Advanced Security
π Security Incident Response
If You Suspect Compromise
Report Security Issues
π¬ Technical Security Details
Cryptographic Specifications
Security Architecture
ποΈ Deterministic Builds
Why This Matters for Security
Quick Verification
Build Environment
Security Guarantees
Next Steps
Last updated