← Home

How It Works

Security architecture of Perpetua Cryptograph

The Watch Signs. The Phone Relays.

Keys are generated on Apple Watch and stored in its Keychain, encrypted by a key in the Secure Enclave. The watch is the signing authority. Every transaction is decoded and approved on the watch before a signature is produced.

The iPhone does not hold keys. The iPhone cannot sign. The iPhone relays data only. Even if the iPhone is fully compromised (by malware, a browser exploit, or a malicious app), the attacker cannot sign transactions or extract private keys. The keys exist only on the watch, protected by the Secure Enclave.

APPLE WATCH Key Generation & Storage Transaction Signing Backup Encryption Secure Enclave (P-256) iPHONE Portfolio Display Network Relay QR Scanning & Printing WalletConnect Bridge Unsigned TX Signature SIGNING AUTHORITY TRANSPORT

What You Trust

You do not need to trust any server, cloud service, or third-party custodian. The watch is the signing authority. The phone is transport. Even if the iPhone is fully compromised by malware, an attacker cannot sign transactions or extract private keys. The keys exist only on the watch.

Recovery

Cryptograph requires you to create and verify a backup during initial setup. There is no "skip" button.

Supply Chain Security

Limits

For the full technical analysis, see the Technical Security Overview.


More questions? See the FAQ or email security@perpetua.watch