Security

Trust the math. Verify the chain.

BlockSign is a thin layer over Solana — and that's the point. The fewer moving parts between your document and the receipt, the less attack surface there is for anyone to forge a signature. Here's how the pieces fit together.

Transport

TLS 1.3 in transit

Every byte between your browser and BlockSign — including signer-side traffic — moves over TLS 1.3 with HSTS preload. Mixed-content downgrade attacks are blocked at the edge.

  • ·HSTS preload list
  • ·TLS 1.3 only
  • ·Forward secrecy via X25519
Storage

Encrypted at rest

PDFs live in Supabase storage with AES-256 encryption at rest. Row-level security policies on the database keep signed-out clients away from documents they're not authorized for.

  • ·AES-256 disk encryption
  • ·RLS on database rows
  • ·Soft-deleted on account close
Anchoring

SHA-256 → Solana memo

Each signed version produces a SHA-256 digest of the exact bytes shown to signers. The digest is committed to Solana mainnet as a memo transaction. The chain is the receipt.

  • ·SHA-256 of canonical PDF bytes
  • ·Solana mainnet memo program
  • ·Sub-second confirmation
Keys

Server-side payer keypair

Signers never need a wallet. BlockSign holds a single payer keypair that signs the memo transaction on behalf of the network. The keypair is loaded from a secret env var — never bundled, never logged, never exposed to the client.

  • ·Payer secret never leaves server
  • ·No client-side key material
  • ·Rotatable without re-anchoring history
Verification

Independent verifier

Anyone holding a signed PDF can verify it — with or without a BlockSign account. The transaction signature is embedded in the file's metadata; the verifier hashes the bytes and compares against the on-chain memo.

  • ·Public verifier at /verify
  • ·Embedded transaction signature
  • ·No login required to check authenticity
Audit trail

Append-only event log

Every view, draft revision, and signature is appended to an internal event log. Each signature also produces its own on-chain memo, so the chain itself becomes a tamper-evident audit trail.

  • ·Per-document event log
  • ·On-chain memo per signature
  • ·Immutable once committed
Disclosure

Found a vulnerability? Tell us first.

We run a coordinated-disclosure policy. Report a vulnerability privately and we'll work with you to fix it — no legal threats, no NDAs required to file. Public credit on request.

Emailsecurity@blocksign.ink
PGPOn request — reply to security@
Response window≤ 72h to acknowledge, ≤ 30d to resolve
Email security@blocksign.ink