IceCase Featues
Main differences of IceCase
The main differences between IceCase and other wallets are in the features of anonymity, independence and security
On anonymity: the device knows nothing about its owner and saying nothing means no passport data, no location, no data from the device, no name, i.e. nothing at all, which excludes the threat of information leakage into public access (and today it can be both accidental as a result of a mistake of developers or an attack on servers, and deliberate in order to discredit it). developers' error or attack on servers, as well as deliberate in order to discredit, at the request of law enforcement agencies, or to cause any other harm ) .
Independence: IceCase is a full-fledged independent device with its own display, software and architecture. Both software and architecture of the device are created by IceCase team and do not use any OpenSource solutions, off-the-shelf operating systems and third-party API / SDK solutions, which makes the device fully independent from third-party vendors.
Also, the device uses direct access to the blockchain using direct connection to nodes, the list of which is only expanding, which gives the opportunity to accelerate the data on the status of the transaction and is able to identify the fastest and cheapest nodes for transactions.
Last, but not least, are of course the safety features and there is a much longer list:
Separate memory cells: the device stores the private key on a separate memory cell from the main module in encrypted form (CC EAL5+) and uses it only when signing a transaction before it is sent to the blockchain (i.e., the memory is used only when necessary and not otherwise)
Anti-scanning coverage: all memory cells of the device are covered with a special material that prevents remote scanning, making it impossible for third parties to obtain information from the device in an unauthorized manner.
auto-destruction when tampering: in case of unauthorized opening of the device case, the system determines this action as a hacking attempt and first deletes all information from memory cells, including private key, information about stored crypto-assets and passwords, and then destroys the modules of the device itself by software disabling protection from overvoltage and discharge and burning all modules including the screen, wifi module, boards and all memory cells. The only thing that will be left to the intruder is practically zero razrazhennogo battery and a few not burned wires.
Restore or create a wallet: Restoring data or starting the device for the first time involves a 24- word SEED-phrase, which is currently the most secure method of first access and is not compromised by automatic SEED-phrase selection solutions.
Comparison by security level
exchange wallet (Coinbase, OKX, Binance, etc.) - the lowest level of security due to a large number of threats: attacks on the server infrastructure, financial problems of the exchange itself, leakage of data on account status or personal data, etc. It is recommended to use only for exchange operations, but not for storing assets.
Multi-currency software wallet installed on a mobile device or PC (Metamask, Trustwallet, etc.) - the security level is slightly higher, but the device itself due to the use of well-known operating systems is also an object for cyber attacks on the device or server infrastructure of the solution provider. It is recommended to use for temporary storage for 2-3 months, but not more due to the large number of third-party dependencies in the software and server part.
cold wallet of "flash device" type (Ledger, Trezor, Tangem, etc.) - the level of security is higher than the previous two types, but the list of threats includes primarily political and economic sanctions, the introduction of which is not so much against you as against your country, can cut you off from access to the account due to your location, which will force you to use third-party VPN services (which includes a separate list of threats) or change location. The services also have your personal information on their side and are subject to essentially the same threats as multi-currency wallets installed on mobile devices or PCs Recommended for short-term storage, but not for long-term storage.
Non-custodial independent cold wallet as a separate device (IceCasе. There are no analogs at the moment) - the highest level of security and anonymity. The device does not store any information about you, connects directly to the blockchain bypassing any third-party server architecture and is completely self-sufficient in terms of software and modular architecture of the device.
The list of threats includes: direct cyber attack on the nodes of the blockchain network itself and loss/missing of the device itself, which when you buy a new device fully restores your data. It is not subject to political or economic sanctions, is not subject to direct cyber attacks due to its own software, does not have a dedicated server part and does not collect user data.
IceCase is recommended for long-term storage of crypto-assets on the principle of "put and forget", "leave as an inheritance" or "hide and protect"
Last updated