Futures
Accédez à des centaines de contrats perpétuels
CFD
Or
Une plateforme pour les actifs mondiaux
Options
Hot
Tradez des options classiques de style européen
Compte unifié
Maximiser l'efficacité de votre capital
Trading démo
Introduction au trading futures
Préparez-vous à trader des contrats futurs
Événements futures
Participez aux événements et gagnez
Demo Trading
Utiliser des fonds virtuels pour faire l'expérience du trading sans risque
Lancer
CandyDrop
Collecte des candies pour obtenir des airdrops
Launchpool
Staking rapide, Gagnez de potentiels nouveaux jetons
HODLer Airdrop
Conservez des GT et recevez d'énormes airdrops gratuitement
Pre-IPOs
Accédez à l'intégralité des introductions en bourse mondiales
Points Alpha
Tradez on-chain et gagnez des airdrops
Points Futures
Gagnez des points Futures et réclamez vos récompenses d’airdrop.
Investissement
Simple Earn
Gagner des intérêts avec des jetons inutilisés
Investissement automatique
Auto-invest régulier
Double investissement
Profitez de la volatilité du marché
Staking souple
Gagnez des récompenses grâce au staking flexible
Prêt Crypto
0 Fees
Mettre en gage un crypto pour en emprunter une autre
Centre de prêts
Centre de prêts intégré
Promotions
Centre d'activités
Participez et gagnez des récompenses
Parrainage
20 USDT
Invitez des amis et gagnez des récompenses
Programme d'affiliation
Obtenez des commissions exclusives
Gate Booster
Développez votre influence et gagnez des airdrops
Annoncement
Mises à jour en temps réel
Blog Gate
Articles sur le secteur de la crypto
AI
Gate AI
Votre assistant IA polyvalent pour toutes vos conversations
Gate AI Bot
Utilisez Gate AI directement dans votre application sociale
GateClaw
Gate Blue Lobster, prêt à l’emploi
Gate for AI Agent
Infrastructure IA, Gate MCP, Skills et CLI
Gate Skills Hub
+10K compétences
De la bureautique au trading, une bibliothèque de compétences tout-en-un pour exploiter pleinement l’IA
GateRouter
Choisissez intelligemment parmi plus de 40 modèles d’IA, avec 0 % de frais supplémentaires
Mobile wallet zero‑days put SDKs under fire – and highlight the case for isolation
Mobile zero‑days and SDK flaws are shredding wallet trust, pushing serious users toward isolated, multi‑device signing to shrink the blast radius.
Summary
The latest wave of mobile vulnerabilities is again exposing how much trust retail users unknowingly place in third‑party software development kits (SDKs) and phone operating systems – and why some security teams are accelerating a shift toward fully isolated signing environments.
Earlier this month, Microsoft detailed a severe intent‑redirection flaw in EngageLab’s EngageSDK, a widely used Android push‑notification library embedded in dozens of financial and crypto wallet apps. The bug allowed malicious apps on the same device to hijack Android intents and bypass the OS sandbox, potentially accessing sensitive data, credentials and transaction information stored inside affected wallets. Microsoft estimates that vulnerable wallet applications alone accounted for more than 30 million installations, with the broader SDK exposure topping 50 million app installs across categories.
In parallel, Google’s Threat Intelligence Group recently disclosedBinance recently warned users about “Darksword,” a sophisticated iOS exploit chain that strings together multiple zero‑day vulnerabilities to gain full control of devices, exfiltrate wallet data and erase logs to cover its tracks. The findings prompted Binance to issue a user advisory in March warning that the campaign targets Security researchers say the campaign targets high‑value users in several regions and relies on compromised or spoofed websites to silently deliver the exploit to otherwise up‑to‑date devices.
These incidents underscore a structural problem: even well‑audited wallet applications can be undermined by underlying mobile stacks, third‑party SDKs or baseband‑level bugs entirely outside the app developer’s control. For users holding meaningful balances, “secure app” assurances are increasingly colliding with the reality of a hostile device environment. Both incidents have since been patched, the EngageSDK fix shipped in November 2025 and Apple has rolled out updates closing the relevant DarkSword vulnerabilities, but the underlying problem is structural and won’t be solved by individual CVE fixes.
One response has been to move critical key material off the general‑purpose phone altogether. Quantography Labs, the team developing Lock.com, is building an early-access platform around an Isolated Crypto Wallet model that separates transaction construction from signing, a model that, unlike traditional hardware wallets, is not designed to depend on proprietary firmware or a single-vendor supply chain. According to the project’s architectural description, the Lock.com Wallet app is designed to run on a user’s everyday device to manage portfolios and build unsigned transactions, while the associated Signer is intended to live on a dedicated offline device that holds the actual private keys and seed. In the proposed flow, transactions would be passed between Wallet and Signer over constrained channels such as QR codes or Bluetooth, with each operation requiring explicit user confirmation on the offline unit before a signed transaction is returned to the online environment.
Panama‑registered Quantography Labs S.A. operates Lock.com, a platform built around an Isolated Crypto Wallet model that separates transaction construction from signing. According to the company’s technical description, the Lock.com Wallet app runs on a user’s everyday device to manage portfolios and build unsigned transactions, but the associated Signer lives on a dedicated offline device that holds the actual private keys and seed. Transactions are passed between Wallet and Signer over constrained channels such as QR codes or Bluetooth, with each operation requiring explicit user confirmation on the offline unit before a signed transaction is returned to the online environment.
By design, that architecture attempts to make broad classes of mobile exploits – from intent‑redirection SDK bugs to full‑chain iOS attacks – less catastrophic. Even if a compromised app or OS obtains control over the online Wallet interface, it should not be able to extract the underlying keys or sign arbitrary movements without access to the separate Signer device. In other words, the attack surface shrinks from “any code running on your phone” to “physical compromise of a dedicated signer.”With mobile zero‑days and SDK issues now a recurring headline, the industry is likely to see more experimentation with isolated signing and multi-device authorization flowssigning, multi‑device flows and quantum‑resistant cryptography. For security‑conscious users, the trade‑off is clear: slightly more friction at transaction time in exchange for reducing the blast radius of the next SDK or OS‑level exploit.