Skip to main content

Security Architecture

Zero-Trust. Quantum-Resistant.
Sovereign by Design.

EDN's security model was not retrofitted. It was architected from first principles around the assumption that classical cryptography will fail. Every layer of our stack reflects that assumption.

The EDN Security Framework

Post-Quantum Cryptography Layer

All document signatures use SPHINCS+ (SLH-DSA), a stateless hash-based signature scheme standardized by NIST in FIPS 205. This algorithm is mathematically resistant to both classical and quantum computational attacks, including Grover's algorithm and Shor's algorithm. No EDN document signature can be forged or reversed by any known or projected quantum hardware.

Hardware Security Module (HSM) Key Custody

Private signing keys are generated inside and permanently stored within a Google Cloud Hardware Security Module operating at FIPS 140-2 Level 3 certification. This means the physical HSM hardware has been validated to resist tampering, probing, and physical extraction. A key generated in our HSM cannot be read — ever — even by EDN engineers. All signing operations occur inside the HSM boundary.

Zero-Trust Identity & Biometric Vetting

Identity verification uses a multi-factor, zero-trust model. We do not rely on password authentication alone. Our Biometric Gate applies liveness detection and government-issued ID cross-referencing before any notarial act is permitted. Our biometric identity vetting is entirely stateless. EDN utilizes zero-persistence processing pipelines where biometric identifiers are strictly processed in-memory for instant verification and permanently purged within 24 hours, adhering to Washington MHMDA and SOC 2 Type 2 privacy standards.

Sophisticated Data Lifecycle Management

01
Session Initiation

Zero-trust biometric identity vetting. TLS 1.3 encrypted channel established.

02
Document Processing

Document hash computed. SPHINCS+ signature applied inside HSM. PII isolated.

03
Blockchain Anchoring

Hash anchored to Ethereum Mainnet via dedicated GCP node. Immutable record created.

04
PII Purge (≤24 Hours)

All raw PII and document content deleted. Cryptographic Security Audit Certificate retained for 50+ years.

The Security Audit Certificate that remains after the 24-hour purge contains no recoverable PII. It is a mathematical proof — a hash and its associated blockchain anchor — sufficient to verify document integrity at any point in the future without retaining the original document.

EDN utilizes public blockchain networks strictly as a neutral, non-custodial decentralized timestamping mechanism. The platform anchors document cryptographic hashes to achieve independent tamper-evidence; EDN does not facilitate, custody, or manage digital financial assets, tokens, or smart-contract-based securities.

Threats EDN Is Designed to Defeat

Harvest Now, Decrypt Later (HNDL)

Adversaries archiving encrypted documents for future quantum decryption are neutralized by SPHINCS+, which has no known quantum attack vector.

Key Extraction & HSM Tampering

FIPS 140-2 Level 3 HSM hardware is physically validated against extraction. No plaintext key ever leaves the HSM boundary.

Data Breach & PII Exposure

The 24-hour PII purge cycle ensures that a breach at any point after session completion exposes zero recoverable client data.

Man-in-the-Middle Interception

TLS 1.3 with certificate pinning on all session endpoints eliminates interception risk during document transmission.

Blockchain Reorganization & Anchor Tampering

Anchoring to Ethereum Mainnet — not a private or L2 chain — means document anchors inherit the full hash power of the most battle-tested public blockchain. Reorganization of 50+ blocks is computationally impossible.

Identity Spoofing & Synthetic ID Fraud

Real-time liveness detection and government ID cross-referencing in the Biometric Gate prevent synthetic or stolen identity use.

Security Whitepaper

Sovereign Trust Infrastructure

The technical case for post-quantum cryptography in regulated digital transactions — SPHINCS+, HSM key custody, blockchain anchoring, and the HNDL threat model explained in full.

Read the Whitepaper

Ready to See the Platform in Action?