How We Build Secure Applications
Security is a core requirement for all our solutions, especially for hightrust scenarios such as mobile remote signatures, authentication apps, and multifactor authentication (MFA). We design these systems to protect identity, integrity of signed data, and resistance to fraud or device compromise.
Security by Design
Mobile Remote Signature & Authentication
For remote signature and authentication applications, we implement:
Transactionlevel confirmation
- Users see what they are signing: humanreadable transaction details (amounts, recipients, document hashes).
- Each signature request includes a unique challenge (nonce) and is timelimited to prevent replay attacks.
- Highrisk actions can require explicit user confirmation with a PIN, biometric, or an additional factor.
MultiFactor Authentication (MFA) Applications
For MFA applications (push approvals, OTP, soft tokens), we use:
Phishing & replay resistance
- Pushbased MFA with transaction details (“Approve login from X at time Y”) instead of just “Yes/No”.
- Use of signed challenges: the app signs a serverissued challenge, making codes nonreusable.
- Optional device binding & detection of suspicious contexts (impossible travel, unusual devices).
Implementation Practices for Secure Apps
Robust authentication & authorization
- Standardsbased protocols: OAuth2.1, OpenID Connect, FIDO2/WebAuthn when applicable.
- Finegrained authorization (roles/claims/policies) with clear separation between user and admin operations.
- Stepup authentication for sensitive actions (remote signature, changing security settings, highvalue transactions).
Hardening of clients
- Obfuscation and hardening of mobile apps to make reverse engineering more difficult.
- Detection of rooted/jailbroken devices and blocking or downgrading trust when necessary.
- Secure local storage, strict clipboard usage, and protection against screenshot/overlay attacks where applicable.
Monitoring, logging & incident response
- Security focused logging: authentication attempts, failed MFA, signature operations (with data minimization).
- Anomaly detection (suspicious login patterns, failed attempts, device changes).
- Clear processes for revoking devices, keys and sessions in case of loss or compromise.