feature(mer-49): initial commit, need to introduce issuer and merchan…#225
feature(mer-49): initial commit, need to introduce issuer and merchan…#225koekiebox wants to merge 7 commits into
Conversation
✅ Deploy Preview for interledger-org-developers ready!
To edit notification comments on pull requests, go to your Netlify project configuration. |
|
|
||
| ## Why Hardware Security Modules Matter in Payments and How They Relate to Rafiki | ||
|
|
||
| Card payments, digital-wallets, and modern financial APIs all depend on one thing that users rarely see: **trust**. |
There was a problem hiding this comment.
The first mention of "digital wallet" appears without a hyphen, so we should stick to that convention throughout.
| Card payments, digital-wallets, and modern financial APIs all depend on one thing that users rarely see: **trust**. | ||
| Not just trust in the institution, or the network, or the device - but trust in the cryptography that protects identities, keys, approvals, and movement of value. | ||
|
|
||
| That **trust** does not happen by accident. It is established through carefully managed cryptographic boundaries, clear ownership of keys, and systems that are designed to avoid exposing secrets where they do not belong. In payment environments especially, this becomes a foundational concern. |
There was a problem hiding this comment.
clear key ownership, and systems designed to avoid exposing secrets
| This is where Hardware Security Modules, or HSMs, come in. | ||
|
|
||
| In our earlier exploration of card payments and Rafiki, a recurring theme emerged: trust is defined as much by key management as by APIs. We looked at POS onboarding, remote key injection, device identity, and separation between payment cryptography and ILP-facing services. | ||
| HSMs sit naturally inside that discussion because they are one of the primary ways financial systems generate, protect, and use sensitive cryptographic material securely. |
There was a problem hiding this comment.
HSMs sit naturally within that discussion because they are among the primary ways
|
|
||
| ## Why Do We Need an HSM? | ||
|
|
||
| If all we needed was encryption, software libraries would often be enough. |
There was a problem hiding this comment.
If all we needed were encryption
|
|
||
| ## What Is an HSM? | ||
|
|
||
| An HSM is a specialized cryptographic device, or in some cases a tightly controlled managed service, designed to generate, store, protect, and use cryptographic keys without exposing those keys in clear form to general-purpose application environments. |
There was a problem hiding this comment.
wihtout exposing them in clear form
| ### Separating duties and trust boundaries | ||
|
|
||
| In real systems, not every service should have equal access to secrets. A payment API may need to request an operation, but it should not be free to extract every key. | ||
| An operations team may need to deploy services, but they should not automatically gain access to master key material. Security teams may need oversight without manually touching every transaction. |
There was a problem hiding this comment.
Security teams may need oversight without having to review every transaction manually.
| Card payments rely on structured key hierarchies and tightly defined cryptographic processes. | ||
| There are issuer-side keys, terminal-side keys, transport keys, PIN-related keys, transaction keys, derivation keys, and keys used for encryption, MACing, or signing. | ||
|
|
||
| These are not casual secrets. They define whether one party can trust the output of another. |
There was a problem hiding this comment.
They determine whether one party can trust another's output.


Please see: https://linear.app/interledger/issue/MER-49/blog-on-payment-hsms
PR Checklist
Fixes #123)bun run formatto ensure code is properly formattedbun run lintpasses without errorsSummary