We don't compromise on security when building features. We use state-of-the-art technologies, and research new security methods and technologies to make strong security guarantees.
Information security
practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. (Wikipedia)
Examples
Private keys and transactions
End to end encrypted chat
Darkness (see who is talking to who)
Cluster uptime
Compromised security?
Trivial: Can't restore your account (private keys)
Subtle: Forward secrecy, either you have or don't
We are responsible for secure defaults
State-of-the-art technologies
'Obvious' choices for experts in field
Chat: Double Ratchet and PFS
Hardware wallet
Reproducible builds
Basic security hygiene
Ex: no password re-use
Ex: 2FA (without phone recovery)
Security and privacy week after Prague
Tool: Threat modeling 101
Pretend to be attacker and follow logic
Example: House with jewelry (high reward) and open back door (vulnerable) and thief (relevant attack).