← Home

How It Works

Security architecture of Perpetua Cryptograph

Why the Watch?

Strong security architecture. To enable Apple Pay, Apple built a security chip into every Apple Watch — the same type of hardware that dedicated crypto wallets use to protect your keys. Cryptograph uses that chip to encrypt and store your keys.

No browser, no email, no messages. Most wallet hacks start with a malicious link or website in Safari, Mail, or iMessage. The Apple Watch doesn't run any of them. The most common attack vectors don't affect Cryptograph, because your keys simply aren't on your phone.

No shipping address to leak. When you buy a hardware wallet, you give the manufacturer your name and address. These customer databases have been breached multiple times, and their customers have received both scam letters and unwanted visitors. Cryptograph is sold through the App Store and maintains no customer database.

No obvious form factor. A hardware wallet in your pocket or luggage is recognizable. An Apple Watch running Cryptograph looks like every other Apple Watch.

Harder to steal. Petty smartphone theft is commonplace. Smartwatch theft requires another kind of crime entirely. Even then, Cryptograph requires a passcode lock on your watch, and can be configured with time- and location-based spend controls.

Your Keys Are Only On Your Watch.

Keys are generated on Apple Watch and stored in its Keychain, encrypted by a key in the Secure Enclave. The watch is the signing authority. Every transaction is decoded and approved on the watch before a signature is produced.

The iPhone does not hold keys. The iPhone cannot sign. The iPhone relays data only. Even if the iPhone is fully compromised (by malware, a browser exploit, or a malicious app), the attacker cannot sign transactions or extract private keys. The keys exist only on the watch, protected by the Secure Enclave.

APPLE WATCH Key Generation & Storage Transaction Signing Backup Encryption Secure Enclave (P-256) iPHONE Portfolio Display Network Relay QR Scanning & Printing WalletConnect Bridge Unsigned TX Signature SIGNING AUTHORITY TRANSPORT

What You Trust

You do not need to trust any server, cloud service, or third-party custodian. The watch is the signing authority. The phone is transport. Even if the iPhone is fully compromised by malware, an attacker cannot sign transactions or extract private keys. The keys exist only on the watch.

Recovery

Cryptograph requires you to create and verify a backup during initial setup. There is no "skip" button.

Supply Chain Security

Limits

For the full technical analysis, see the Technical Security Overview.


More questions? See the FAQ or email security@perpetua.watch