The Trust Model
Rather than asking users to trust operators, Arkade implements technical safeguards that transform “trust the operator” into “verify the operator.” Every layer of the system is designed so that misbehavior produces cryptographic evidence, honest execution can be independently verified, economic incentives punish cheating, and communication between users and the signer remains uncensorable. In normal operation, users interact through the fast collaborative path where the operator cosigns transactions. If anything goes wrong, users fall back to the unilateral exit path that requires no operator involvement at all.Unilateral Exit
Every VTXO comes with a set of presigned Bitcoin transactions that can be broadcast at any time without requiring cooperation from the operator or anyone else. This is the self-custody guarantee.How It Works
VTXOs are organized in a virtual transaction tree rooted in a batch output. To exit, a user broadcasts the transactions along their specific path through the tree, from the batch output down to their individual VTXO. Example exit path:- Batch Output → Virtual Transaction A (first level)
- Virtual Transaction A → Virtual Transaction B (second level)
- Virtual Transaction B → User’s VTXO (final claim)
Exit Costs
Every unilateral exit incurs Bitcoin network fees for each transaction in the path. The deeper a VTXO sits in the tree, the more transactions are required:- Direct child of batch output: 1 Bitcoin transaction
- Second level: 2 Bitcoin transactions
- Third level: 3 Bitcoin transactions
This cost structure creates natural economic incentives to settle periodically rather than letting exit paths grow indefinitely. Users should balance the convenience of extended offchain activity against the cost of maintaining unilateral exit optionality.
Security Stack
Four mechanisms work together to constrain operator behavior and protect users.Arkade Signer
Arkade Signer
The Arkade Signer is an architectural separation that isolates transaction signing authority from operator control. Rather than allowing the operator to directly sign user transactions, signing responsibility is delegated to a separate module that operates under verifiable constraints.The Signer generates a single signing key required for all VTXO cosigning. This key is protected within a secure hardware environment (TEE) that prevents access even by the operator. Users communicate directly with the Signer through encrypted channels, ensuring that signature requests remain confidential and uncensorable.This transforms the trust model from relying on operator honesty to relying on cryptographic and hardware guarantees that can be independently verified.
Verifiable Execution (TEE)
Verifiable Execution (TEE)
The Arkade Signer runs inside a Trusted Execution Environment (TEE), an isolated hardware environment that can attest to the software it is running.The TEE provides several properties:
- Key isolation. The signing key is generated and maintained inside the TEE. It is inaccessible to the operator or any external process.
- Tamper resistance. The isolated environment provides strong guarantees against external interference.
- Remote attestation. Anyone can verify, using open-source software and reproducible builds, that the Signer is running the expected code.
End-to-End Encryption
End-to-End Encryption
Communication between users and the Arkade Signer is designed to support end-to-end encryption (E2EE). Even though the operator serves as coordinating infrastructure, E2EE prevents the operator from:
- Seeing what specific transactions are being processed
- Blocking individual transactions based on their content
- Analyzing user behavior patterns
Risks & Limitations
Previous: VTXO Lifecycle & Liveness
Expiration, renewal, and delegation.
Start Building
Create your first Arkade wallet with the TypeScript SDK.