Security model
Access is gated by physical device confirmation and cryptographic signatures. The device generates signatures that prove intent without exposing keys to the host computer.
Key protections
- On-device display for transaction details
 - Ephemeral session tokens and origin scoping
 - Signed messages with clear intent and metadata
 
Operational guidance
- Always verify the address on-device before approving.
 - Use hardware-backed U2F or WebAuthn where possible for account access.
 - Keep companion apps and firmware up to date from official resources.