The method employs Securosys’ hardware security modules to keep participants’ keys safe.



Source link