Security model
Access is gated by physical device confirmation and cryptographic signatures. The device generates signatures that prove intent without exposing keys to the host computer.
Key protections
- On-device display for transaction details
- Ephemeral session tokens and origin scoping
- Signed messages with clear intent and metadata
Operational guidance
- Always verify the address on-device before approving.
- Use hardware-backed U2F or WebAuthn where possible for account access.
- Keep companion apps and firmware up to date from official resources.