From trusted execution isolation, secure element signing to encrypted NFC recovery, MAGNE protects digital asset ownership at the system level.
System-level process isolation for stronger operational control
CC EAL2+Dedicated hardware supports private key storage and transaction signing
CC EAL6+Offline backup and physical recovery capability, extending protection beyond the device
CC EAL6+The first layer of protection operates at the system execution level. Sensitive operations are isolated in a trusted execution environment, separate from the main operating system. the isolated execution environment is designed to reduce exposure even when the main OS is under attack.
This is not software-based isolation — it is architectural separation built into the hardware foundation of the device. It defines which processes can access what, and creates hard boundaries around the most sensitive operations.
The second layer is where private keys live. Unlike software wallets where keys are stored in application memory, MAGNE's secure element is a dedicated hardware component designed specifically for cryptographic key storage and signing operations.
Private keys are designed to remain protected within the secure element during normal signing workflows. When a transaction needs to be signed, the signing operation happens inside the secure boundary — the main processor does not have access to the raw private key. This follows a hardware-backed security design philosophy similar to dedicated cryptographic security modules.
The third layer addresses the oldest problem in digital asset management: what happens when you lose access to your device? NFC-based encrypted backup extends protection beyond the hardware itself.
When you set up MAGNE, an encrypted backup is generated and stored on an NFC tag or another device. This backup contains the information needed to recover your assets — without exposing your private keys in plain text. Recovery is physical, offline, and does not require cloud access or a third party.
Three dedicated security chips, each serving a distinct role in protecting your digital assets.
UTEE • CC EAL2+
NFC Controller + eSE • CC EAL6+
Standalone Secure Element • CC EAL6+
Software wallets usually require a trade-off between usability and security; MAGNE provides system-level improvements for these key issues through a hardware-supported security architecture.
| Aspect | Software Wallets | MAGNE |
|---|---|---|
| Key Isolation | Keys stored in app memory, accessible to OS | Keys isolated in dedicated secure hardware |
| Signing Environment | Software-based signing on main processor | Hardware signing inside secure element boundary |
| Backup Method | Seed phrase (can be stolen, lost, or guessed) | NFC encrypted backup — physical, offline, no seed exposure risk |
| Device Exposure | Entire device must be trusted and secure | Sensitive signing operations isolated in secure hardware, reducing main system exposure. |
| Recovery Mode | Depends on seed phrase + third-party tools | Offline NFC recovery without cloud or third-party |
| Certification | No hardware security certification | CC EAL2+ / CC EAL6+ related component-level certification reference |
MAGNE's security architecture integrates TEE, secure elements, and offline recovery capabilities, aimed at enhancing key protection, signing processes, and asset recovery security at the device level. The following describes relevant security components and capabilities; certifications mentioned apply to corresponding components, modules, or evaluation scope, and do not represent the entire machine, complete system, or all commercial configurations have obtained the same level of certification.
UTEE is a trusted execution environment with a CC EAL2+ evaluation basis, used to isolate sensitive data and key operations from the main system, supporting encrypted keys and user data processing in a trusted environment.
HYPERSEED N60 is a custom security solution combining secure processing capabilities with an integrated NFC module, with related security elements having CC EAL6+ certification reference. This component supports encryption operations, key isolation, and offline key recovery capabilities.
HYPERSEED 72B is a secure processor component with an NFC RF expansion interface, with related security elements having CC EAL6+ certification reference, used to support additional encryption and key recovery functions.
MAGNE's security architecture references third-party security assessments and certifications at the component level, including CC EAL2+ TEE-related evaluations and CC EAL6+ secure element certifications. These certifications apply to corresponding components, modules, or evaluation scope, and do not represent that the entire machine, complete system, or all commercial configurations have obtained the same level of certification.
Relevant documents can be provided upon request for cooperation, review, or institutional due diligence.
Selected certification documents, certificate numbers, and applicable scope can be provided upon request for cooperation, review, or institutional due diligence needs. Public pages are for high-level reference only.
Relevant documents available for further verification by partners, reviewers, and institutional contacts.
Request AccessRelevant certification documents apply to corresponding components, modules, or evaluation scope.
Request AccessPartial technical and certification reference materials available upon due diligence needs.
Contact MAGNE
Certification documents, certificate numbers, and applicable scope can be provided upon request for cooperation, review, or institutional due diligence needs. Public pages are for high-level reference only and do not constitute a claim that the entire machine, complete system, or all configurations have obtained the same level of certification.
Contact MAGNE →
MAGNE's security architecture references third-party security assessment and certification results at the component level, including CC EAL2+ TEE-related evaluations and CC EAL6+ secure element certifications. These certifications apply to corresponding components, modules, or evaluation scope, and do not represent that the entire machine, complete system, or all commercial configurations have obtained the same level of certification.
Trusted execution environment validation, ensuring process isolation
Secure element certification, supporting key storage and signing
Dedicated secure element separate from main processor
Selected certifications and technical references available upon request
For institutional due diligence, technical partnerships, or security architecture discussions, our team is available.