Blockchain security solutions
With the world slowly realizing that cryptocurrencies, tokenized assets and smart contracts are the new wild west of financial instruments, threats come as well. Regulatory pressure and cybersecurity risks are harder to mitigate when your technological stack is novel and based on new cryptography-based technologies. Our solutions enable compliance with regulations such as GDPR, CCPA and completion of Privacy Impact Assessment (PIA), Data Protection Impact Assessment (DPIA).
Cryptocurrencies require combining novel cryptography with traditional data, application and product security expertise to solve blockchain security issues.
Blockchain security challenges
Blockchain security is hard
Poorly implemented crypto and appsec
Transaction and smart-contract privacy
Modern blockchain security solutions
ZKPs: SNARKs, SNORKs, STARKs
Custom cryptosystems and primitives
Tools and services we offer
Transaction privacy and ZKP
We specialise in designing privacy-oriented cryptographic layers based on zk-SNARKs and multi-party computation protocols.
Our team of experienced cryptographers implements complex cryptographic protocols: zero-knowledge proofs, custom curves/signatures, SMPC, homomorphic operations.
We design & implement traditional application security, data security and infrastructure security measures for crypto wallets, blockchain nodes, and backends.
Auditing and reviewing
We perform security audits and design reviews of crypto wallet security and blockchain security issues. We define their fitness against threat models and suggest improvements.
Have a question? Get a human to answer it!
How we make a difference
Experience with typical constructions
Our mission is simple.
We help you focus on serving your customers better, while relieving your team from security engineering pains and making your users confident that their data is safe with you.
There are many ways we can help: with our products, bespoke solutions, and engineering services. Leave your contact information to connect with our team:
Relevant stories and posts
Crypto wallets security as seen by security engineers
Read about building secure crypto wallets and issues we found when doing crypto wallet security audits. Hot non-custodial wallets store private keys, sign crypto transactions, and claim to be secure. But are they?
Zero Knowledge Protocols without magic
Zero Knowledge protocols are often used for authentication, as they allow two parties to verify whether they share the same secret without revealing it. We explain different use cases and how to use them on practice.
Security of React Native libraries: the bad, the worse and the ugly
How to select a secure React Native library for your app. Sort out improper platform usage, easy to misuse API, deprecated and abandoned libraries – check our research of the React Native ecosystem security.