Content pfp
Content
@
0 reply
0 recast
0 reaction

Privy pfp
Privy
@privy
1/ How embedded wallets work, pt 2 Excited to share our most thorough dive yet on the system that powers Privy embedded wallets Dive in to understand how we built Privy and use key splitting to optimize across: πŸ”’ Security ✨ UX πŸ‘©β€πŸ’» DevX ⬆️ Ability to upgrade over time
1 reply
3 recasts
5 reactions

Privy pfp
Privy
@privy
2/ Tradeoffs abound when building self-custodial systems We set out to select a stable, simple architecture that keeps users in control and safeguards against attackers across the threat landscape Building for scaled crypto apps today, but flexible as primitives mature tomorrow
1 reply
0 recast
1 reaction

Privy pfp
Privy
@privy
3/ We evaluated 3 promising alternatives: Shamir Secret Sharing (SSS), Threshold Signature Systems (TSS) and Trusted Execution Environments (TEEs). We ultimately decided SSS offered the best balance across self-custody, security, and flexibility for our use case today.
1 reply
0 recast
1 reaction