Architecture
- Non‑custodial: You control your keys and assets
- Direct protocol integrations: No pooled custody
- Decentralized execution: On‑chain settlement
Trusted Execution Environments (TEEs)
Sensitive operations are protected using TEEs for defense‑in‑depth. Not even Lute can access this information ensuring your information and actions stay private.Key handling
- Privy partnership for secure key management
- Export controls: Keys exportable only after creation; store securely
Encryption
State‑of‑the‑art cryptography and encryption across data in transit and at rest.Users are responsible for safely handling exported or imported private keys and should never share keys with another individual.