Post-Quantum Cryptography

The JIL Wallet incorporates post-quantum cryptographic algorithms - specifically Dilithium for digital signatures and Kyber for key encapsulation. These algorithms are designed to remain secure even against quantum computers, which could theoretically break the elliptic curve cryptography used by most blockchains today. While practical quantum computers capable of this are likely years away, JIL implements these protections now because security infrastructure must be forward-looking. Waiting until quantum threats materialize means waiting too long.

WebAuthn and Passkeys

WebAuthn is a W3C standard that enables passwordless authentication using hardware security keys, biometrics, or device-bound credentials. In the JIL Wallet, you can register a WebAuthn credential (such as a fingerprint reader, Face ID, or a YubiKey) as a primary or secondary authentication method. WebAuthn credentials are phishing-resistant because they are cryptographically bound to the specific domain - they cannot be tricked into authenticating on a fake website. This is a significant security upgrade over passwords and even over traditional 2FA methods.

TOTP Two-Factor Authentication

The wallet supports TOTP (Time-Based One-Time Password) through standard authenticator apps like Google Authenticator, Authy, or 1Password. When enabled, every login and sensitive operation requires both your primary credential (password or passkey) and a rotating 6-digit code from your authenticator app. TOTP adds a time-sensitive second factor that changes every 30 seconds, making intercepted codes useless after their brief validity window. Enabling TOTP is strongly recommended for all users and can be enforced as a policy for enterprise accounts.

Device Trust Scoring

The JIL Wallet maintains a trust score for each device that accesses your account. Factors include whether the device has been used before, its browser fingerprint, geographic location, and time-of-day patterns. New or unusual devices trigger additional verification steps - such as an email confirmation or 2FA challenge - before being granted access. This adaptive security layer catches unauthorized access attempts even when credentials have been compromised, because the attacker's device profile will not match your established patterns.

Protection Coverage

The JIL Wallet offers protection coverage tiers that insure your assets against certain types of loss, including unauthorized access, protocol-level failures, and bridge exploits. Coverage amounts scale with your wallet tier - from basic coverage on the free Core tier up to enhanced coverage on Elite and Enterprise plans. Protection coverage is subject to underwriter agreements and specific terms, but the intent is to provide the same kind of deposit insurance that traditional banking customers expect. Full details and coverage limits are available in the wallet Security settings.