Skip to main content
Security is foundational to Lute. Funds remain in your control with a non‑custodial design and industry‑leading protections.

Architecture

  • Non‑custodial: You control your keys and assets
  • Direct protocol integrations: No pooled custody
  • Decentralized execution: On‑chain settlement

Trusted Execution Environments (TEEs)

Sensitive operations are protected using TEEs for defense‑in‑depth. Not even Lute can access this information ensuring your information and actions stay private.

Key handling

  • Privy partnership for secure key management
  • Export controls: Keys exportable only after creation; store securely

Encryption

State‑of‑the‑art cryptography and encryption across data in transit and at rest.
Users are responsible for safely handling exported or imported private keys and should never share keys with another individual.
I