Fortmatic
Published in

Fortmatic

Security & Infrastructure at Fortmatic

Background

Our philosophy on key management

The design behind the new Delegated Key Management architecture

Leveraging hardware security modules

How client interact with AWS

New user key generation

User signing transactions

Account recovery

Powering smart contract wallets

Migration of older users

Security Audit and Compliance

CSRF and XSS

Phishing and Iframe

SIM Hijacking and SIM Porting

End-to-end Encryption with TLS

Infrastructure Security Architecture

Network Setup

Intrusion Detection Setup

Data Encryption at Rest

Why AWS?

Security

Reliability, Availability, and Scalability

Optionality

Conclusion

We are hiring!

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Sean Li

ceo @magic_labs @fortmatic | ex-@docker @kitematic | @uwaterloo alumni