Skip to content

Security Architecture

Vortum implements a multi-layer security model to protect user assets and ensure system integrity.

Security Model

Non-Custodial Design

Users maintain full control of their assets:

  • No private keys stored — Keys are distributed across ICP nodes
  • Threshold signatures — Transactions require consensus from multiple nodes
  • User-controlled — Only you can authorize withdrawals
  • Auditable — All operations recorded on-chain

Authentication Methods

ICP Identity Providers

ProviderTypeDescription
Internet IdentityWebAuthn/FIDO2ICP's native decentralized identity with biometric support
NFIDEmail-basedII-compatible with email recovery option
OISYWalletICP wallet with transaction signing

Blockchain Wallet Login

BlockchainWalletsProtocol
SolanaPhantom, SolflareSign-In with Solana (SIWS)
BitcoinPhantom, UnisatSign-In with Bitcoin (SIWB)

Blockchain wallet authentication uses a "Sign-In with X" (SIWx) pattern:

  1. User signs a message with their wallet
  2. Vortum verifies the signature
  3. A delegated ICP identity is created linked to the wallet address
  4. User can interact with the platform using their wallet identity

Coming Soon

FeatureDescription
PasskeysWebAuthn-based passwordless authentication

Cryptographic Security

FeatureImplementation
Bitcoin signingThreshold ECDSA (secp256k1)
Solana signingThreshold Ed25519
Key derivationBIP32/BIP44 HD wallet standards
EncryptionVetKeys for sensitive data
2FA secretsClient-side only with Merkle commitments

Rate Limiting

Protection against abuse with tiered access:

TierRate Limit
Unregistered10 req/min
Registered100 req/min
Verified1000 req/min

Two-Factor Authentication

Optional TOTP-based 2FA using a Merkle tree commitment scheme:

Security properties:

  • Secret stays with you — TOTP secret is never transmitted to the server
  • Cryptographic commitment — Server stores only a 32-byte Merkle root
  • Proof-based verification — You prove knowledge via Merkle proofs
  • Encrypted backup — Optional recovery backup encrypted with VetKeys

Verifiable Execution

FeatureDescription
Deterministic matchingPrice-time priority ordering
Audit trailsComplete settlement history per account
Deterministic orderingOrders processed in arrival sequence
TransparentYour settlements queryable on-chain

Asset Security

  • All deposits go to unique per-user addresses
  • Withdrawals require authentication (+ optional 2FA)
  • Address book for trusted withdrawal addresses
  • Minimum withdrawal amounts per chain
  • Treasury controlled by multi-sig

Security Features Status

FeatureStatus
Internet Identity✅ Live
NFID✅ Live
OISY Wallet✅ Live
Solana wallet login (SIWS)✅ Live
Bitcoin wallet login (SIWB)✅ Live
Passkeys🔜 Coming Soon
TOTP 2FA✅ Live
Rate limiting✅ Live
Address book✅ Live
Audit trails✅ Live
Multi-sig treasury✅ Live