2. Hardware-Level Encryption and Key Management
All cryptographic material is generated and stored within the device’s secure hardware (Secure Enclave for iOS, StrongBox or Trusted Execution Environment for Android).
Private keys are non-exportable and exist only inside the secure hardware module.
Transaction signing occurs locally, preventing exposure of key data to the main OS or network.
Sensitive files use AES-256 encryption with per-device keys derived from hardware entropy and user PINs.
On devices without hardware support, Xym falls back to a software key vault secured with Argon2-derived keys and enforced biometric authentication.
This design prevents extraction even under forensic examination or full system compromise.
Last updated