New: Offline-first licensing with cryptographic validation. Learn more
Security

Security & Compliance

Enterprise-grade security with open source transparency. No black boxes in your critical infrastructure.

Open source verification library

Our client library is MIT-licensed and open source. Security teams can audit every line of code that runs in your air-gapped environment.

  • Full source code access

    Inspect every line of the verification logic

  • No obfuscation

    Clear, readable Rust code with full documentation

  • Build from source

    Compile your own binary for maximum trust

Security Model
┌─────────────────────────────────────┐
│         Your Application            │
├─────────────────────────────────────┤
│    Licenz Client (Open Source)      │
│    ┌───────────────────────────┐    │
│    │ • Signature Verification  │    │
│    │ • Hardware Fingerprint    │    │
│    │ • Time Validation         │    │
│    │ • Feature Extraction      │    │
│    └───────────────────────────┘    │
├─────────────────────────────────────┤
│         License File                │
│    ┌───────────────────────────┐    │
│    │ • Signed Claims (JWT-like)│    │
│    │ • Hardware Binding        │    │
│    │ • Expiration Date         │    │
│    │ • Feature Flags           │    │
│    └───────────────────────────┘    │
└─────────────────────────────────────┘
  ↑ Your public key validates
  │ No network required

Modern cryptographic standards

Industry-standard algorithms with pluggable architecture for future-proofing

RSA-SHA256

2048/3072/4096-bit keys for license signatures. Industry standard for asymmetric encryption.

Ed25519

Modern elliptic curve signatures. Faster verification, smaller keys, same security level.

AES-256-GCM

Authenticated encryption for state storage. Protects clock state and local data.

Argon2id

Memory-hard key derivation for hardware-bound encryption keys. Resistant to GPU attacks.

Pluggable Architecture

Strategy pattern allows swapping algorithms. Ready for post-quantum (Dilithium, Kyber) when needed.

No Phone Home

Zero network calls during validation. Your public key is all that's needed to verify licenses.

Hardware fingerprinting

Bind licenses to specific machines using multiple hardware identifiers with weighted scoring and drift tolerance.

Collected Identifiers

  • • MAC addresses (with weight scoring)
  • • Disk serial numbers
  • • Hostname
  • • Machine ID (OS-specific)
  • • Container/VM detection

Fuzzy Matching

Minor hardware changes (RAM upgrade, new network card) don't invalidate licenses. Configurable threshold for matching tolerance.

Environment Detection

Docker containers Detected
Kubernetes pods Detected
AWS EC2 Detected
Google Cloud Detected
Azure VMs Detected
Virtual machines Detected

Time-tampering protection

Prevent clock rollback attacks on time-limited licenses

Monotonic Clock Tracking

Records high-water mark of observed time. Detects if system clock is rolled back.

Encrypted State Storage

Clock state encrypted with hardware-derived key. Can't be copied between machines.

Multi-Location Storage

State stored in multiple locations. Harder to tamper with all copies simultaneously.

Compliance readiness

Built with enterprise compliance requirements in mind

Data Sovereignty

  • Self-hosted deployment option for enterprise
  • No data leaves air-gapped networks
  • Full audit logging available

SOC 2 Path

  • Security controls documented
  • Access controls and RBAC
  • Enterprise SSO/SAML support

GDPR Compliance

  • Data export capabilities
  • Data deletion on request
  • EU data residency options

Industry Standards

  • HIPAA-compatible for healthcare
  • FedRAMP path for government
  • ISO 27001 alignment

Responsible disclosure

We take security seriously. If you discover a vulnerability, please report it responsibly.

Email security issues to security@licenz.dev

We aim to respond within 24 hours and will work with you to understand and address the issue. We do not pursue legal action against researchers acting in good faith.

Ready to secure your software?

Enterprise-grade security with open source transparency.