Burner doesn’t use a traditional seed phrase, which can be easily lost or compromised. Instead, it generates a unique, non-extractable key pair during manufacture, eliminating the need for a seed phrase. This approach enhances security and simplifies the user experience as there is no app or software that can accidentally leak key material or export it for social engineering attacks.
You may opt to generate a new key pair when you receive Burner by adding some of your own entropy to the process of key generation. This user entropy is used in conjunction with other internal entropy sources to generate a key pair such that even if user entropy is stored or revealed it cannot be used to regenerate or derive the private key.
Private keys generated on a Burner are never extractable outside of Burner(s), ensuring that your assets remain secure within the hardware. Since the private key is non-extractable, viewing or recovering a seed phrase is not possible.
But what about Card Duplicator?
Card Duplicator is a feature that allows you to backup one Burner from another Burner. In order to do this securely and ensure that no key material is exposed outside of Burner secure elements, the process includes several steps:
The source Burner and the target Burner verify each others authenticity
The Burners establish a shared key that is not revealed to the client (your smartphone)
The shared key is used to encrypt the key which is then passed from the source Burner to the target Burner
The key is decrypted and stored in the target Burner
During this process the client cannot view raw key material nor can it decrypt the key material passed from one Burner to another Burner.
Learn more about our secure chip technology in this blog post.