Security
Security is not a feature; it is the foundation of Planbok. Our architecture is designed to assume compromise and mitigate impact through defense-in-depth strategies.
Cryptographic Primitives
We utilize ECDSA (secp256k1) and EdDSA (Ed25519) threshold signature schemes. Our implementation undergoes regular audits and is based on the peer-reviewed CGGMP21 protocol.
Infrastructure Security
- Zero Trust Networking: All inter-node communication is mutually authenticated via mTLS.
- Air-Gapped Signing: Optional support for offline signing nodes.
- Memlock Protection: Critical memory regions are locked to prevent swapping to disk.
Compliance
Planbok is designed to meet SOC 2 Type II and ISO 27001 requirements.