Dasar
Spot
Perdagangkan kripto dengan bebas
Perdagangan Margin
Perbesar keuntungan Anda dengan leverage
Konversi & Investasi Otomatis
0 Fees
Perdagangkan dalam ukuran berapa pun tanpa biaya dan tanpa slippage
ETF
Dapatkan eksposur ke posisi leverage dengan mudah
Perdagangan Pre-Market
Perdagangkan token baru sebelum listing
Futures
Akses ribuan kontrak perpetual
CFD
Emas
Satu platform aset tradisional global
Opsi
Hot
Perdagangkan Opsi Vanilla ala Eropa
Akun Terpadu
Memaksimalkan efisiensi modal Anda
Perdagangan Demo
Pengantar tentang Perdagangan Futures
Bersiap untuk perdagangan futures Anda
Acara Futures
Gabung acara & dapatkan hadiah
Perdagangan Demo
Gunakan dana virtual untuk merasakan perdagangan bebas risiko
Peluncuran
CandyDrop
Koleksi permen untuk mendapatkan airdrop
Launchpool
Staking cepat, dapatkan token baru yang potensial
HODLer Airdrop
Pegang GT dan dapatkan airdrop besar secara gratis
Pre-IPOs
Buka akses penuh ke IPO saham global
Poin Alpha
Perdagangkan aset on-chain, raih airdrop
Poin Futures
Dapatkan poin futures dan klaim hadiah airdrop
Investasi
Simple Earn
Dapatkan bunga dengan token yang menganggur
Investasi Otomatis
Investasi otomatis secara teratur
Investasi Ganda
Keuntungan dari volatilitas pasar
Soft Staking
Dapatkan hadiah dengan staking fleksibel
Pinjaman Kripto
0 Fees
Menjaminkan satu kripto untuk meminjam kripto lainnya
Pusat Peminjaman
Hub Peminjaman Terpadu
Promosi
AI
Gate AI
Partner AI serbaguna untuk Anda
Gate AI Bot
Gunakan Gate AI langsung di aplikasi sosial Anda
GateClaw
Gate Blue Lobster, langsung pakai
Gate for AI Agent
Infrastruktur AI, Gate MCP, Skills, dan CLI
Gate Skills Hub
10RB+ Skills
Dari kantor hingga trading, satu platform keterampilan membuat AI jadi lebih mudah digunakan
GateRouter
Pilih secara cerdas dari 40+ model AI, dengan 0% biaya tambahan
Mobile wallet zero‑days put SDKs under fire – and highlight the case for isolation
Mobile zero‑days and SDK flaws are shredding wallet trust, pushing serious users toward isolated, multi‑device signing to shrink the blast radius.
Summary
The latest wave of mobile vulnerabilities is again exposing how much trust retail users unknowingly place in third‑party software development kits (SDKs) and phone operating systems – and why some security teams are accelerating a shift toward fully isolated signing environments.
Earlier this month, Microsoft detailed a severe intent‑redirection flaw in EngageLab’s EngageSDK, a widely used Android push‑notification library embedded in dozens of financial and crypto wallet apps. The bug allowed malicious apps on the same device to hijack Android intents and bypass the OS sandbox, potentially accessing sensitive data, credentials and transaction information stored inside affected wallets. Microsoft estimates that vulnerable wallet applications alone accounted for more than 30 million installations, with the broader SDK exposure topping 50 million app installs across categories.
In parallel, Google’s Threat Intelligence Group recently disclosedBinance recently warned users about “Darksword,” a sophisticated iOS exploit chain that strings together multiple zero‑day vulnerabilities to gain full control of devices, exfiltrate wallet data and erase logs to cover its tracks. The findings prompted Binance to issue a user advisory in March warning that the campaign targets Security researchers say the campaign targets high‑value users in several regions and relies on compromised or spoofed websites to silently deliver the exploit to otherwise up‑to‑date devices.
These incidents underscore a structural problem: even well‑audited wallet applications can be undermined by underlying mobile stacks, third‑party SDKs or baseband‑level bugs entirely outside the app developer’s control. For users holding meaningful balances, “secure app” assurances are increasingly colliding with the reality of a hostile device environment. Both incidents have since been patched, the EngageSDK fix shipped in November 2025 and Apple has rolled out updates closing the relevant DarkSword vulnerabilities, but the underlying problem is structural and won’t be solved by individual CVE fixes.
One response has been to move critical key material off the general‑purpose phone altogether. Quantography Labs, the team developing Lock.com, is building an early-access platform around an Isolated Crypto Wallet model that separates transaction construction from signing, a model that, unlike traditional hardware wallets, is not designed to depend on proprietary firmware or a single-vendor supply chain. According to the project’s architectural description, the Lock.com Wallet app is designed to run on a user’s everyday device to manage portfolios and build unsigned transactions, while the associated Signer is intended to live on a dedicated offline device that holds the actual private keys and seed. In the proposed flow, transactions would be passed between Wallet and Signer over constrained channels such as QR codes or Bluetooth, with each operation requiring explicit user confirmation on the offline unit before a signed transaction is returned to the online environment.
Panama‑registered Quantography Labs S.A. operates Lock.com, a platform built around an Isolated Crypto Wallet model that separates transaction construction from signing. According to the company’s technical description, the Lock.com Wallet app runs on a user’s everyday device to manage portfolios and build unsigned transactions, but the associated Signer lives on a dedicated offline device that holds the actual private keys and seed. Transactions are passed between Wallet and Signer over constrained channels such as QR codes or Bluetooth, with each operation requiring explicit user confirmation on the offline unit before a signed transaction is returned to the online environment.
By design, that architecture attempts to make broad classes of mobile exploits – from intent‑redirection SDK bugs to full‑chain iOS attacks – less catastrophic. Even if a compromised app or OS obtains control over the online Wallet interface, it should not be able to extract the underlying keys or sign arbitrary movements without access to the separate Signer device. In other words, the attack surface shrinks from “any code running on your phone” to “physical compromise of a dedicated signer.”With mobile zero‑days and SDK issues now a recurring headline, the industry is likely to see more experimentation with isolated signing and multi-device authorization flowssigning, multi‑device flows and quantum‑resistant cryptography. For security‑conscious users, the trade‑off is clear: slightly more friction at transaction time in exchange for reducing the blast radius of the next SDK or OS‑level exploit.