![Key icon](https://cdn.prod.website-files.com/64516fef70e3c53e580425b7/64516fef70e3c51fbd04272e_Security%20icon%20-%20keys.svg)
Users register by creating a cryptographic key pair, then subsequently authenticate using digital signatures.
![Shield icon](https://cdn.prod.website-files.com/64516fef70e3c53e580425b7/64516fef70e3c5984304272d_Security%20icon%20-%20shield.svg)
Private keys are securely stored on a user's device and never leave.
![Lock icon](https://cdn.prod.website-files.com/64516fef70e3c53e580425b7/64516fef70e3c549d004272b_Security%20icon%20-%20lock.svg)
Key pairs are bound to specific domains, so browsers automatically prevent cross-site phishing attacks.