Security Notes
Solident is designed on the principle that security must never rely on a single point of failure. Every component of the system is layered, encrypted, and verifiable.
"The strongest security is layered security."
1. No raw biometrics ever stored
The system never keeps photos or videos.
Only encrypted templates are created and used for local matching.
Templates cannot be reversed to reconstruct a face.
2. Patterns never stored in plain text
User patterns are always converted into salted hashes.
The hash is the only data stored and used for verification.
This prevents attackers from guessing or reusing raw patterns.
3. End-to-end encryption
All biometric templates and pattern hashes are encrypted before leaving the device.
Users control their encryption keys at all times.
Without the key, the data is meaningless to outsiders.
Security without ownership is not security. That’s why only the user holds the key.
4. Local-first verification
Face scans are matched on the device, not in the cloud.
This reduces the attack surface and eliminates risks of centralized storage leaks.
Only verification results are passed forward, never raw inputs.
5. Step-up authentication for sensitive actions
Quick access (like balance checks) requires only a face scan.
Critical actions (like withdrawals or contract approvals) require both face and pattern.
This flexible model improves protection without hurting usability.
6. Recovery safeguards
Recovery keys are encrypted and offline-first.
Even during recovery, no raw biometrics are ever transmitted.
This ensures continuity without sacrificing privacy.
Security Summary
Encrypted biometric templates, never raw data
Salted pattern hashes, never plain text
Local-first verification model
User-owned encryption keys
Step-up security for critical actions
Private recovery with no exposure
Solident’s model makes it simple for users and nearly impossible for attackers.
Last updated