Trust Engine minimizes centralized data retention and uses cryptographic proofs and on-chain records to verify provenance. This page outlines our current security model and planned improvements.
Server-side fee payer: A managed wallet sponsors on-chain SOL fees for self flows.User wallets: Non-custodial wallets are supported; managed wallets are available. Keep private keys secure (we never ask for user private keys).
Planned: HSM custody, automated key rotation, enterprise multi-signature support
File contents: Not centrally stored. For registration, we transiently process the file to derive its hash and pin to IPFS; the original bytes are discarded after processing.Search: In the Registry UI, you can verify by hashing locally in the browser; the file never leaves your device. The API also supports server-side hashing; files are discarded after hashing.Metadata: Only what you explicitly submit (title/description/custom fields). Avoid sensitive PII. If your file embeds EXIF or other metadata, strip it before upload or consider encrypting the asset you register.IPFS: Content is content-addressed and publicly retrievable by CID. We pin to improve availability; we do not re-host a proprietary copy.On-chain: Hashes, timestamps, and registration records are immutable.
Transport: HTTPS/TLS for API communication.Validation & limits: Basic payload validation and size limits in product surfaces; large/binary uploads are restricted to explicit endpoints.
Planned: API keys for production integrations, adaptive rate limits, WAF/DDoS layers, certificate pinning (mobile), strict schema validation, magic-number file checks