About Icynote security
1. Truly random
Bitcoin addresses are created from an aleatory number, whereby the problem is that current computing technology cannot generate pure randomness. Our random generator is created by a Quantique photon counter machine, we work with the Swiss world leader in random generation tools which pass the NIST SP800-22 Test Suite compliance.
2. Special paper support
Our banknotes are made of 100% high density polyethylene fibers randomly laid and compressed to form a remarkably tough printing substrate which is ideal for long term durability & tear resistance. The characteristics include LIGHTWEIGHTNESS, PAPER-LIKENESS, RECYCLABILITY, BREATHABILITY, WATER RESISTANCE, TEAR RESISTANCE.
We only use inks reserved exclusively for security applications on financial documents such as banknotes, stocks, bonds, checks, identity documents such as passports, birth certificates, visas, driver’s licenses and other security documents. They are made available exclusively to official and recognized high-security printers. The same are also used for the Swiss Franc banknotes. We work with a Swiss company with 93 years of experience in this domain.
In order to meet the high security standards for the production of our banknotes, we work with the Swiss leader in this field with 70 years of experience from the first graphic proposal to the mass production embossing tool in a high-security environment. This technology is the same used by the Swiss Government for official documents.
This a Swiss-patented method which comprises a holographic printing process with infrared inks based on wavefront modulation which diffracts light at wide angles, making an unique seal of authenticity.
6. Electronic Signature
A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. All our wallets are signed with our private key, a mobile application with our public key helps our customers to control that the Icynote you are getting was fabricated by us. From another side, it makes it possible to check the validity of the App that is downloaded from the Apple or Android stores.
- A signing algorithm which signs the banknote with a private key
- A mobile application which checks the authenticity of the signature
7. Other hidden and high technology security
The Icynotes have a total of 29 security features making our banknote one of the most secure documents on earth. We can prove the integrity, that the document has not been altered. Authenticity that means that its origin can be identified. Proof of existence that allows the identification of a time reference when the document was created and existed. Non-repudiation prevents an originator from repudiating being the originator of a document.
8. Swiss notary proof of integrity, authenticity, non-repudiation, and unicity
So, a special protocol for creating the cold wallets, erasing the cold wallets and destroying all hard drives after production exists at the printing company. Supervision by a Swiss notary and a Swiss IT security company, the printer’s 27001 security risk compliance team and SMD security team furnishes proof that files used in the printer are deleted after production. At the end of the process unicity proof is performed and there is absolutely no possible means of replicating it.
9. Printing company with ISO 27001
The entire production and printing process is performed in Switzerland by a Swiss printing specialist who has provided premium quality printing for over 70 years, including ISO 27001 certification.
10. Private key and wallet address quality checks per batch
Our company’s quality check tests the first (A) and the last (B) Icynote of every batch and two random Icynotes (C, D) as follows. We send a small amount of cryptocurrency to A, then from A to B, then from B to C, then from C to D, and then from D to the original source. If this passes the test, it implies that the batch and each individual Icynote are printed correctly.