nem.. its architecture consists of NCC(client) and NIS(server). this split design is revolutionary. for example, i can run the ncc part of nem locally on a computer (and soon on mobile) and connect to a remote instance of NIS (even if its a malicious persons nis) and interact with the blockchain securely and also harvest on that nis and any rewards will automatically be forwarded to my account by use of delegated harvesting. the split architecture of nem is the first of its kind and allows for all sorts of innovations moving forward.
the white paper:
https://drive.google.com/file/d/0B7wAe2jt1MMzYVJhUUFnMHQxZ1U/viewNEM was purposely designed to support things just like this. NEM's wallet is completely separated from its server and the wallet is open source, so a person can go into NEM, redo the wallet, build the app to run on the NEM network and nobody would even know. NEM's wallet is also light enough to run on a iOS or Android so each app in itself has access to the network and the a really great part, all the keys and important signings of transactions all happen locally. At no point, even if you connected to a malicious node that was purposely trying to steal your money in a sneaky way could that be possible. Those nodes simply don't have access, but the wallets have lots of access to lots of nodes.