It's a secure wallet -- and you don't have to install it!
In addition, the wallet natively integrates a growing number of applications developed by Intercoin and audited by third parties, that lets people participate in, and manage, various community activities across websites: :
The way crypto wallet browser extensions store the user's private keys is actually by encrypting them at runtime in Javascript (using material derived from the user's password), and storing the encrypted version in the browser's local storage. Then they load the keys into their Javascript execution environment and use it to sign the transactions. Wallets deployed as apps do a similar thing, except the code might not be in a browser extension.
An exception is the "Fortmatic/Magic wallet" and related wallets which use Amazon Key Management Service so users basically trust Amazon.
The Intercoin wallet don't rely on Amazon and won't require a browser extension or an app, but will work inside iframes. It leverages subresource integrity and service workers to ensure that the client-side code hasn't changed, and exactly matches what's been audited by third parties, and doesn't "phone home" any private information to any server.
Authentication in the Intercoin Wallet is done by means of WebAuthn (you can see a demo of how it works in your own browser). The keys are stored inside a U2F device or -- these days very often -- in a secure enclave inside the computer or phone on which the browser is running.
The challenge comes from the blockchain, with the material being derived from a pseudo-random oracle that is infeasible to predict. The user signs the challenge using either WebAuthn or a Web Crypto using a non-extractable key. For now, most operating systems and hardware modules only support the secp256r1 elliptic curve, instead of the secp256k1 used in Bitcoin and Ethereum.
(Some prominent people in the crypto space, including Vitalik Buterin, believe that the r1 curve was chosen because it has a weakness that can be exploited by state actors. However, it is used in all major security implementations outside crypto, including TLS, DNSSEC, Appleβs Secure Enclave, Passkeys, Android Keystore, and Yubikey, which can be used in the EVM.)