Wednesday, June 8, 2022
HomeWordPress DevelopmentEnhancing safety & cryptography in in style cryptocurrency wallets

Enhancing safety & cryptography in in style cryptocurrency wallets


Numerous folks apply the concept that “blockchain is safe” by default to each undertaking that has “blockchain” in its description. However in tech, you already know it’s not so easy.

From a safety perspective, we frequently see weak factors requiring particular consideration in cryptocurrency ecosystems and their wallets (learn our weblog publish Crypto wallets safety as seen by safety engineers to 🐬 deep dive into the subject). When working with massive blockchain foundations, we be sure that their ecosystem (wallets, backends, APIs, protocols) are safe.


▶️ Take a look at a real-life instance.

Say, there’s a blockchain basis with a non-custodial cryptocurrency pockets accessible for tens of millions of customers as cellular functions and an internet extension.

The customers, regulators, traders, and many others. anticipate that the cryptocurrency pockets provides the identical degree of safety ensures as fashionable monetary or banking apps.

💡 Since it is a non-custodial cryptocurrency pockets, particular consideration must be paid to defending information on the consumer aspect and its communication with a blockchain.

This comes with the requests for:
✔️ superior degree of safety,
✔️ encryption for information at relaxation (non-custodial wallets retailer non-public keys and mnemonics),
✔️ platform-specific safety controls for all of the supported platforms,
✔️ constructing app safety into UX.

▶️ Now this appears like a job for us.

So, we roll up our sleeves and, utilizing the superpower 🙂 of our cellular apps safety, safety and cryptography engineering providers, and a cryptographic library Themis, we:

🎯 assess dangers and do risk modelling for the apps and backend ecosystem.
🎯 conduct a deep cryptography audit of the pockets: net extension (Chrome, Firefox, Chromium) and cellular apps (iOS, Android).
🎯 present cryptographic enhancements and dozens of utility safety enhancements aligned with the “protection in depth” method.
🎯 analyze the event course of and advise SSDLC enhancements (from additional automation in CI/CD pipeline to formalizing a safety roadmap).

Learn the element behind each stage in our case research Filling cryptography and safety gaps in cryptocurrency wallets🐬 to find out how these efforts resulted in net extension and cellular apps synced of their safety ensures and offering defence in depth safety for the customers’ information. 🔐


Simple to make use of cryptographic framework for information safety: safe messaging with ahead secrecy and safe information storage. Has unified APIs throughout 14 platforms.

Themis provides strong, usable cryptography for busy people

Themis offers sturdy, usable cryptography for busy folks


GitHub release
Platforms
Coverage Status


Themis Core
Integration testing
Code style
Circle CI
Bitrise

Common goal cryptographic library for storage and messaging for iOS (Swift, Obj-C), Android (Java, Kotlin), React Native (iOS, Android), desktop Java, С/С++, Node.js, Python, Ruby, PHP, Go, Rust, WASM.

Good match for multi-platform apps. Hides cryptographic particulars. Made by cryptographers for builders 🧡

What Themis is

Themis is an open-source high-level cryptographic providers library for securing information throughout authentication, storage, messaging, community alternate, and many others. Themis solves 90% of typical information safety use circumstances which are frequent for many apps.

Themis helps to construct each easy and complicated cryptographic options simply, rapidly, and securely. Themis permits builders to deal with the primary factor: creating their functions.

Use circumstances that Themis solves

  • Encrypt saved secrets and techniques in your apps and backend: API keys, session tokens, information.

  • Encrypt delicate information fields earlier than storing in database (“application-side field-level encryption”).

  • Assist searchable encryption, information tokenisation…

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments