Overview
Planbok is engineered with a defense-in-depth philosophy, ensuring that institutional-grade security never comes at the cost of user sovereignty. Our architecture eliminates single points of failure by combining cutting-edge Multi-Party Computation (MPC) with zero-knowledge cryptographic blinding.
The Three Pillars of Planbok Security
Our security model is built on three fundamental principles that protect assets against infrastructure compromise, insider threats, and unauthorized access.

1. Distributed Custody (MPC)
Unlike traditional wallets that rely on a single private key, Planbok uses a 2-of-2 MPC architecture. Key material is distributed between two independent nodes (Node 1 and Node 2). A full private key never exists in any single location—not in memory, not on disk, and not during the signing process.
2. Cryptographic Sovereignty
We believe you should be the final arbiter of your assets. Through our PIN-blinding and Organization Secret mechanisms, we ensure that Node 1's share is cryptographically locked by entropy that only you control. Planbok cannot unilaterally sign transactions or move funds without your explicit authorization.
3. Institutional Compliance
Security is only as good as its visibility. Every operation within Planbok—from API key creation to transaction signing—is captured in an immutable audit trail. This, combined with our granular Role-Based Access Control (RBAC), ensures that your organization meets the highest standards of regulatory and operational compliance.
Security at a Glance
| Feature | Protection Mechanism | Security Purpose |
|---|---|---|
| Share Separation | Nodes 1 & 2 in isolated environments | Prevents single point of failure |
| Encrypted Transit | Mutual TLS + gRPC | Protects internal communication |
| Key Blinding | Argon2id Hashing & Org Secrets | Ensures user/org sovereignty |
| Vault Integration | HSM / KMS storage | Secures shares at rest |
| Auditability | Immutable event logging | Forensic and compliance tracking |
Next Steps
Explore the technical details of our security architecture:
- MPC Protocol & Node Architecture: How we achieve threshold signing.
- Key Management & Blinding: Deep dive into sovereign entropy.
- Platform & Network Security: Infrastructure-level hardening.
- Audit & Compliance: Operational transparency and RBAC.