Whitepaper
ivault Homepage
English
English
  • Welcome to ivault
  • About ivault
    • The world as we see it
    • Why ivault?
      • A track record of success
      • Blockchain pioneers
      • Tried and tested technology
    • ivault's history
      • Then: ivault app 1.0
      • Now: ivault app 2.0
    • Awards & Recognition
  • Market Analysis
    • Four problems
    • One solution
    • Market opportunity: shareconomy
    • Market opportunity: sustainability
    • ivault's user base
    • Why people will use ivault
      • To live an easier and more affordable life
      • To live more sustainably
      • To meet people and share experiences together
    • Example use cases
      • Alex, 20, university student
      • Madelaine, 41, software engineer
      • George, 55, carpenter
      • Jia Li, 36, DJ
  • ivault App
    • How ivault works
      • Step 1: Create account
      • Step 2: Add items
      • Step 3: Share and connect
      • Step 4: Earn and save
    • Key Features
      • 1. Fair and transparent: Peer-to-peer marketplace
        • 1.1 Low publishing costs: a shareconomy for everyone
        • 1.2 Accurate value estimates: fair pricing is built in
        • 1.3 Trust certification: know what you’re borrowing
      • 2. Neighborhood-first social features: building togetherness
      • 3. Rewarding sustainable actions: measure impact and earn points
        • 3.1 Earn reward points for using the app
        • 3.2 Track positive impact
        • 3.3 Learn and earn: gamification meets incentivization
      • 4. User control: non-custodial wallet for blockchain access
        • 4.1 Enhanced security: users control their data
        • 4.2 Enhanced privacy: users have private keys
        • 4.3 Trust and confidence: ensured through the Vault
  • ivault’s Blockchain Ecosystem
    • Why we use Blockchain
    • Architecture
    • The ivault Chain
      • Key functions
    • Public Networks
    • Token Swap
    • TEOS
  • The ivault Token
    • Earning ivault Tokens
    • Using ivault Tokens
    • Reward Points
    • Tokenomics
    • Token Sale
      • How we’ll use funds
        • ivault’s marketing approach
  • Security & Privacy
    • User Control
    • Privacy
    • KYC & AML
    • Industry Standards
  • Roadmap
  • Our Team and Advisors
    • Management Team
  • Disclaimer
Powered by GitBook

© 2023 - ivault

On this page
Export as PDF
  1. Security & Privacy

Industry Standards

We’ve built our app’s security from the ground up following the industry standards of OWASP (Open Web Application Security Project). They act as a seal of trust, instilling confidence and ensuring a safe, seamless user experience. ivault users also have complete control over their assets and data through a non-custodial wallet. Together, this guarantees maximum security for our users and shows our commitment to protecting each and every one of them.

How ivault follows OWASP standards:

  • Cryptographic standards secure user data – including private keys for non-custodial wallets – so it can’t be read or manipulated if intercepted.

  • Insecure Direct Object References (IDOR) prevention validates, filters and cleans all data inputs to prevent unauthorized access of user wallets and other resources.

  • Secure authentication and session management prevents unauthorized access.

  • Cross-Site Scripting (XSS) and injection attacks protection validates and cleans all data inputs and outputs to prevent attacks, such as stealing user keys or other sensitive information.

  • Secure and up-to-date configuration of our servers, databases, and other systems minimize the risk of a security breach.

  • Regular vulnerability checks and updates of our third-party libraries, frameworks, and components mitigate any potential security risks.

  • Avoiding unnecessary redirects and forwards – or validating them – helps to prevent phishing attacks.

We also have extra security measures for our non-custodial wallets:

  • Secure key storage: Users’ private keys are encrypted and securely stored on their device – not on our servers.

  • Biometric authentication: Optional fingerprint or face recognition or accessing the wallet.

  • Backup and recovery: Users can recover their assets if they lose access to their device.

PreviousKYC & AMLNextRoadmap
Page cover image