Data encryption standards
Solident is built on the principle that identity data must remain private, permanent, and tamper-proof.
To achieve this, all biometric templates, pattern hashes, and session data are secured with industry-grade encryption standards.
"Encryption isn’t an option — it’s the baseline of trust."
Core Standards
AES-256 for local storage
All biometric templates and pattern hashes are encrypted at rest using AES-256.
Keys are generated inside the device’s secure enclave or trusted execution environment (TEE).
Even if storage is copied, the encrypted files are meaningless without the keys.
SHA-3 for hashing
Patterns and sensitive factors are hashed with SHA-3 before encryption.
Salts and unique device identifiers are added to strengthen resistance to brute force.
Prevents attackers from reconstructing inputs even if hashes are leaked.
Elliptic Curve Cryptography (Ed25519)
Used for wallet key generation and transaction signing.
Lightweight and fast, optimized for Solana’s network.
Private keys never leave the enclave, ensuring they remain invisible to the outside world.
TLS 1.3 for communication
All communication between devices and RPC providers (Helius) is encrypted using TLS 1.3.
Forward secrecy prevents old sessions from being decrypted even if keys are compromised in the future.
Zero-Knowledge Anchoring (future)
Hash proofs of templates may be anchored on-chain without revealing underlying data.
Allows external verification of integrity while preserving privacy.
Planned integration for Phase 4.
Encryption Principles
Local-first: Data is always encrypted before leaving the device.
Key isolation: Encryption keys never appear in main memory, only inside secure enclaves.
Non-reversible templates: Biometrics cannot be reconstructed into raw images.
User sovereignty: Only the rightful user’s factors (face + pattern) can unlock data.
By following these encryption standards, Solident ensures that even in the worst-case scenario, a stolen device, a breached storage provider, or compromised network, user identity remains private, secure, and in their control.
Last updated