Content
@
0 reply
0 recast
0 reaction
Privy
@privy
1/ How embedded wallets work, pt 2 Excited to share our most thorough dive yet on the system that powers Privy embedded wallets Dive in to understand how we built Privy and use key splitting to optimize across: π Security β¨ UX π©βπ» DevX β¬οΈ Ability to upgrade over time
1 reply
3 recasts
6 reactions
Privy
@privy
2/ Tradeoffs abound when building self-custodial systems We set out to select a stable, simple architecture that keeps users in control and safeguards against attackers across the threat landscape Building for scaled crypto apps today, but flexible as primitives mature tomorrow
1 reply
0 recast
1 reaction
Privy
@privy
3/ We evaluated 3 promising alternatives: Shamir Secret Sharing (SSS), Threshold Signature Systems (TSS) and Trusted Execution Environments (TEEs). We ultimately decided SSS offered the best balance across self-custody, security, and flexibility for our use case today.
1 reply
0 recast
1 reaction
Privy
@privy
4/ SSS is a battle-tested algorithm with multiple OS implementations that have scaled in production. With it, we can ensure neither Privy/customers can access keys. That said, this space is moving fast, and we are deeply excited about advances in TSS and TEE!
1 reply
0 recast
1 reaction