📄️ Core Architecture
The core architecture of Human Wallet is based on the following core primitives:
📄️ Compared to WaaS
Human Wallet differs substantially from wallet-as-a service (WaaS), along dimensions such as trust model, security, use cases, and of course business model. You can think of it as a secure, web3-native alternative to WaaS tailored to many real-world use cases such as those involving secure storage of funds and usage of the funds across multiple applications.
📄️ Malware Resistance
The 2PC(-MPC) eliminates single points of failure for the private key. This means a compromised user, server, or network can at most suggest a transaction to be signed that the other party must approve for it to actually be signed...
📄️ Blind Signing Resistance
The security of human wallet is geared toward being like standard financial services one company with a large budget for security controls the entirety of user funds. However, with Human Wallet, security is outsourced without a company being able to access any funds!
📄️ Audits & Security Partners
Human Wallet and its underlying protocols (Human Network and Zeronym) been audited. However, equally important, Human Wallet incorporates an advanced threat model and extensively employs security consultants in the design and implementation of features before audits are even done. Additionally, we have found and responsibly disclosed numerous bugs in other wallets to help secure their user funds. This had led to Human Wallet being a leader in wallet security.