Security Notes

Solident is designed on the principle that security must never rely on a single point of failure. Every component of the system is layered, encrypted, and verifiable.


"The strongest security is layered security."


1. No raw biometrics ever stored

  • The system never keeps photos or videos.

  • Only encrypted templates are created and used for local matching.

  • Templates cannot be reversed to reconstruct a face.


2. Patterns never stored in plain text

  • User patterns are always converted into salted hashes.

  • The hash is the only data stored and used for verification.

  • This prevents attackers from guessing or reusing raw patterns.


3. End-to-end encryption

  • All biometric templates and pattern hashes are encrypted before leaving the device.

  • Users control their encryption keys at all times.

  • Without the key, the data is meaningless to outsiders.


Security without ownership is not security. That’s why only the user holds the key.


4. Local-first verification

  • Face scans are matched on the device, not in the cloud.

  • This reduces the attack surface and eliminates risks of centralized storage leaks.

  • Only verification results are passed forward, never raw inputs.


5. Step-up authentication for sensitive actions

  • Quick access (like balance checks) requires only a face scan.

  • Critical actions (like withdrawals or contract approvals) require both face and pattern.

  • This flexible model improves protection without hurting usability.


6. Recovery safeguards

  • Recovery keys are encrypted and offline-first.

  • Even during recovery, no raw biometrics are ever transmitted.

  • This ensures continuity without sacrificing privacy.


Security Summary

  • Encrypted biometric templates, never raw data

  • Salted pattern hashes, never plain text

  • Local-first verification model

  • User-owned encryption keys

  • Step-up security for critical actions

  • Private recovery with no exposure


Solident’s model makes it simple for users and nearly impossible for attackers.

Last updated