For independent review

Security review — one-page index

This page exists so cryptographers, pentesters, and procurement reviewers can step through ArcaKey’s security artifacts in a defined order and file findings against a known baseline.

  1. Step 01

    §9 lists what this draft does not yet prove.

  2. Step 02

    §3 lists in-scope adversaries; §4 lists out-of-scope adversaries.

  3. Step 03

    §4 explains how to verify an evidence artifact offline.

  4. Step 04

    The Sovereign activation gate.

  5. Step 05

    Verify the ArcaKey binding signature with the published pubkeys.

  6. Step 06
    Review security.txt.

    File findings against the disclosure policy.

Reviewer contact. Cryptographers and pentesters with questions or preliminary findings should email security@arcakey.ai. We acknowledge within 1 business day and triage within 5.