Skip to content

Commit

Permalink
initial docs on the hardware signer
Browse files Browse the repository at this point in the history
  • Loading branch information
trbutler4 committed Oct 25, 2024
1 parent cdee322 commit 6125dd9
Show file tree
Hide file tree
Showing 2 changed files with 26 additions and 0 deletions.
1 change: 1 addition & 0 deletions docs/src/SUMMARY.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,7 @@
- [Introduction](./README.md)

- [Overview](./overview/README.md)
- [Hardware Signer 🚧](./overview/hardware-signing.md)

- [Getting Started 🚧](./getting-started/README.md)
- [Building the OS 🚧](./getting-started/building-the-os.md)
Expand Down
25 changes: 25 additions & 0 deletions docs/src/overview/hardware-signing.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@


# Leveraging secure enclave for hardware signing


## The Android side

Android allows for creating and signing with a secure private key that cannot be
extracted from the device via the secure keystore system.

[Android Keystore Documentation](https://developer.android.com/privacy-and-security/keystore)

Some notable features:
- Extraction prevention: key material cannot be extracted from the deivce in case of theft and
cannot be accessed by application processes.
- Hardware security module: similar to a Trusted Execution Environment (TEE), but specifically
embedded Secure Elements (eSE) or on-SoC secure processing units (iSE)
- Key use authorizations: specific authorizations can be set (and cannot be changed) to enforce
key usage to meet certain constraints such as specific algortithms or time intervals.


## The Starknet side

On Starknet, our account implementation needs to allow for this hardware signer.

0 comments on commit 6125dd9

Please sign in to comment.