Security first

Security First.

Self-custody architecture, layered authentication, post-quantum cryptography, and account recovery - without giving up control of your keys.

Self-Custody Architecture

MPC 2-of-3 key splitting. You always hold a shard. No single party - including JIL - can access your assets alone.

Layered Authentication

Passkeys, biometrics, TOTP 2FA, device trust scoring. Multiple layers that adapt to risk level.

Post-Quantum Cryptography

Dilithium signatures and Kyber key encapsulation. Future-proof against quantum computing threats.

Recovery Without Compromise

Lost your device? Recover access through identity verification without exposing your keys or giving up self-custody.

Security by design
No seed phrase to lose or have stolen
70% BFT validator consensus for bridge operations
Device trust scoring catches unauthorized access attempts
All smart contracts verified on Sourcify
Independent Security Testing

Every layer of the JIL platform has been independently tested and verified by third-party security firms. The following assessments were performed across the full stack.

Penetration Testing

Full black-box and white-box penetration testing across all infrastructure layers - network perimeter, web application, smart contracts, and bridge relay attack surfaces. OWASP Top 10 and blockchain-specific threat models applied.

API Security Testing

Comprehensive REST API assessment covering authentication flows, authorization boundaries, input validation, rate limiting, session management, and data exposure across all wallet and enterprise endpoints.

Service Endpoint Validation

End-to-end validation of all microservice endpoints including inter-service communication, message queue integrity, database access controls, and TLS certificate chain verification.

Performance Testing

Load testing, stress testing, and capacity planning across settlement infrastructure, bridge operations, and wallet services. Validated under sustained production-scale traffic and peak-load scenarios.

Security Testing

Static analysis, dependency vulnerability scanning, secrets detection, and secure coding review across the full codebase. SAST and DAST tooling applied to all frontend and backend components.

Testing scope

Click each item to view test cases and results

Independently Verified

The security testing and validation described on this page was performed by the following independent firms:

Emerging Technologies, LLC

Arizona, United States

BlockchainX

India

Assessment completed March 2026

Security is not a feature. It is the foundation.

Every layer of JIL - from wallet to bridge to settlement - is built with security as the primary design constraint, not an afterthought.