Key Features

1. Secure Sandbox Environment

All wallets, dApps, and communication apps operate inside an encrypted, isolated layer. The host operating system and other apps cannot access or monitor internal data or activity.

2. Hardware-Level Encryption

Private keys are stored using the device’s Secure Enclave or StrongBox. Keys are non-exportable and used only for local signing within the secure hardware environment.

3. Integrated Private Network

All connections inside Xym Network route through an internal VPN with DNS filtering. This setup blocks phishing domains, hides IP information, and encrypts traffic end-to-end.

4. Stealth Mode

Xym Network can run in stealth mode, appearing as a neutral system app or hiding its presence completely. It can only be accessed through a secret PIN or gesture. In stealth mode, all data remains encrypted and inaccessible to external inspection.

5. Private App Management

Users can safely install and hide common Web3 wallets, DeFi tools, or social apps like Telegram and X within the sandbox. Each runs in a dedicated container, fully isolated from others.

6. Anti-Phishing and Drainer Protection

A built-in risk engine reviews contract calls and approvals before any transaction is signed. It detects suspicious code or token permissions and alerts users before execution.

7. Encrypted Storage

All app data, cache, and logs are stored within an encrypted file system. Even with physical access or forensic tools, this data remains unreadable without the user’s encryption keys.

8. Private Recovery

Two secure recovery paths:

  • Default: PIN + verified Gmail and phone, protected by a 24–48 hour time-lock.

  • Advanced: Master seed phrase that restores the entire sandbox, including apps and wallets.

9. Multi-Chain Support

Xym Network supports EVM and Solana chains, enabling users to manage multiple wallets and assets across ecosystems within the same secure space.

10. Stealth and Panic Features

A decoy PIN opens a blank version of Xym Network, concealing real data. A panic command can securely wipe encrypted storage if a user is under duress or suspects compromise.

Last updated