Skip to main content
Signex

Signex security is architecture, not a promise

The private key never leaves the browser. The server receives public certificate fields only. Infrastructure is hosted in Kazakhstan.

Private key is never sent to the server
Only public certificate fields are stored server-side
Signex infrastructure is hosted in Kazakhstan

Data inventory

WhatWhereHow longWho has access
EmailIdentity DBUntil account deletionAccount owner and system admins
Passphrase hashIdentity DBUntil account deletionPlain passphrases are never visible
IINCertificate rowsUntil certificate or account deletionAccount owner; masked in logs
Full name and certificate fieldsCertificate rowsUntil certificate or account deletionAccount owner
Audit logAudit DBAnonymized after user deletionSystem admins for investigations
CSP reportsApplication logsShort termOperations team

v1 threat model

We defend against opportunistic scanners, credential stuffing, account enumeration, CSRF, bot bursts, and accidental IIN or token leakage in logs.

v1 does not model state actors, motivated insiders with production DB access, full DDoS, or cryptographic proof that a linked certificate belongs to the user.

Accepted risks

  • • style-src 'unsafe-inline' remains for Tailwind CSS variables.
  • • A malicious actor who knows an email can temporarily lock that user.
  • • Thumbprints and IINs are not globally unique across users.
  • • NCA RK chain validation is not performed server-side.
  • • Certificate link is not proof-of-possession.
  • • CSP reporting is anonymous, with caps and filtering.

Kazakhstan personal data law citation will be added after legal review.

Report a vulnerability