Security Architecture
Understanding the carrier-grade authentication infrastructure.
Cloud Infrastructure
Key Security Principles
1. Hardware-Isolated Authentication
Authentication relies on the SIM and the device's secure enclave (or trusted execution environment), which operate in isolated memory and CPU space separate from the application layer. This hardware-level isolation means applications cannot access or tamper with the authentication credentials. All authorization, session creation, and validation occur server-side.
2. OAuth-Style Authorization Flow
Partners receive client_id and client_secret credentials that are exchanged for short-lived, scoped access tokens. Access tokens are issued by Glide, not generated or stored on the client.
3. Cryptographically Bound Sessions
Temporary encrypted artifacts are generated by the carrier's TS.43 service using Glide-provided keys. These can only be decrypted by Glide's backend and are bound to a specific session and context.
Why Common Attacks Fail
| Attack Vector | Why It Fails |
|---|---|
| Copy client-side data | Cannot be decrypted by third party |
| Replay session | Cannot establish new session - tokens are single-use. Replay protection is also enforced at the underlying protocol level. |
| Bypass validation | Backend-issued session validation required |
| Phone number spoofing | SIM-level authentication (EAP-AKA) determines physical SIM |

