- End-to-end encrypted communication between devices uses Message Layer Security (MLS) end-to-end encrypted communication between devices.
- W3C Verifiable Credentials (VCs) allow users to securely assert and demonstrate claims about themselves and others.
- Identity is underpinned by a robust, tamper-evident and W3C Distributed Identifiers (DIDs) compliant Public Key Infrastructure (PKI) allowing for realtime management of keys and their revocations.
- Encryption uses a number of industry standard and accredited ciphers, signature schemes and cryptographic functions, such as Ed25519 (FIPS 186-5), SHA3 (FIPS 202), AES 256 (FIPS 197) and Curve25519.
- All actions are authenticated via signature, with real time key revocation to ensure you are always making up to date decisions.
- Keys are held securely in an on-device encrypted wallet.
- Usage of keys are always gated via biometric checks.
- Identity and verification is fully decentralised.
- User data is not stored centrally