Securing Your Digital Assets

WiKey is built on a zero-knowledge decentralized blockchain to safeguard your digital assets: data, files, secrets, and cryptocurrency funds. It addresses the challenge of keeping passwords, passkeys, and secret keys hidden from hackers while protecting your assets and keys from theft.Hacking into your organization's CRM, ERP, or email can cause significant damage, often resulting from human error. This risk extends to WEB3, where losing your secret phrase means losing your funds forever. WiKey shields both your WEB2 accounts from takeover and data loss and your WEB3 assets.

Pricing & Billing Frequently asked questions

What is your pricing model?
We offer a free plan, for everyone to try.  The free plan is limited to one domain.  If you like to keep the product, than you need to pay a minimal monthly or yearly payment

Blockchain Frequently asked questions

Are you using a token, if yes than why?
The system is decentralized and relies on validators for security. We don't own or control your data, secrets, or configurations, and our token is merely used as a utility to operate and compensate validators, but users don't need it.
To ensure everyone can be a validator in a permissionless way and prevent a 51% attack, staking and tokens are necessary.
However, users seeking simplicity can opt to pay a fixed monthly or yearly price for system usage, although it's not mandatory.
Are you storing my secret key or password somewhere?
If you import a secret key, our app splits it into encrypted fragments and sends them to decentralized servers. Alternatively, WiKey can generate its own key and work with your current wallet.This storage method is like how Bitcoin is protected by miners or validators.

Avoid centralized, closed-source systems as they rely on humans and can't be verified for trustworthiness.
Does the ERC-4337 standard really implement WiKey's functionality?
ERC-4337 is a proposal for a wallet operating with smart contracts, limited to EVM systems, excluding blockchains like Bitcoin. In contrast, WiKey functions across all existing networks, including Bitcoin, and also FIDO2 protected websites.
WiKey’s helpers are valid and applicable to all networks.In ERC-4337, members must have coins on the same blockchain as the user, complicating usage. WiKey doesn’t require users to hold tokens to operate.
Users must define addresses separately for each network and ensure members don't lose these addresses. Moreover, there's no tracking of inactive members or protection against wallet hijacking, phishing, or loss.Popular wallets like Argent, serving over a million users, are restricted to EVM networks like ERC-4337
How do you make UI easier or cleaner than current wallets?
Our WEB3 wallet offers advanced features like cross-chain multi-signature functionality and rule-based management.
Users can utilize its full capabilities or opt for a simple self-custody solution that eliminates the need to remember, store, back up, or safeguard their secret key.

With WiKey, accessing the wallet isn't reliant on typing in a secret phrase or logging in with Google, which poses significant security risks. Instead, users regain access by reaching out to trusted friends, family, or colleagues.You'll only need to seek assistance from helpers if you lose your phone; otherwise, their help isn't required.

WiKey isn't limited to our wallet; it's compatible with most cold or warm wallets. By integrating with other wallets, users can enjoy their preferred interface without worrying about securing their secret phrase

Recovery & Helpers Frequently asked questions

Why your recovery method provides a major competitive advantage?
Other solutions necessitate users to conceal and back up their secret key or password, posing security risks and a single point of failure if the backup is lost or compromised by hackers.
When the secret key is held by a custodian, there's a risk of identity theft, where the custodian might be tricked into releasing the keys, potentially leading to data or fund theft by hackers impersonating the user.
WiKey offers a system compatible with thousands of websites (being FIDO2 complaint) and nearly all existing wallets, safeguarding data and funds from phishing and hacking attempts
Helpers can help but do we really want our funds or data dependent on other people?
WiKey offers compatibility with traditional methods of recovering digital assets, including email or text message recovery options. While users are cautioned about the risks, they're not restricted from using them.WiKey caters to three main user groups:
1. Corporate users, where the IT manager typically assigns helpers. The IT manager can also designate themselves as a helper, maintaining backward compatibility. However, this approach may be less secure in larger organizations where the IT manager may not be familiar with all employees.

2. Personal users who require secret phrase backup often share the key with family members, risking collusion or key loss. Storing on a cloud drive poses similar risks, as anyone with access can retrieve the secret phrase or key. Users may opt for a custodian solution or WiKey's self-custody option after evaluating available choices.

3. Unbanked users, lacking traditional identification, can assign helpers who know them personally, eliminating the need for formal ID.
If people rely on the helpers they defined, and some of them die or disappear, would the user be in trouble?
Users only require assistance from their helpers if they lose access to their mobile devices.
WiKey addresses this by monitoring users and their helpers. It checks if helpers have their own helpers to ensure assistance is available when needed.
Users can also track helper activity in the system and receive alerts if helpers become inactive.
This way, users can avoid choosing helpers without their own helpers in advance.
WIth WiKey, helpers are valid and applicable to all networks.
In ERC-4337, members must have coins on the same blockchain as the user, complicating usage. WiKey doesn’t require users to hold tokens to operate.
Users must define addresses separately for each network and ensure members don't lose these addresses. Moreover, there's no tracking of inactive members or protection against wallet hijacking, phishing, or loss.Popular wallets like Argent, serving over a million users, are restricted to EVM networks like ERC-4337
With WIKey, after each secret key recovery, a new secret key is created. Is this an advantage or a disadvantage?
In WiKey, a new secret key is generated after each recovery. This is beneficial because if a user suspects their wallet has been compromised (like if their phone is sent for repair), they can initiate a recovery to get a new secret code.
This new code renders the old key useless, providing added security.
What makes you different than the Apple/Google/Duo and other FIDO2 authenticators
Most 2FA, MFA, or FIDO authenticators require proof of identity during recovery. Google and Apple FIDO2 authenticators store passkeys in iCloud or Google cloud for recovery if a phone is lost, posing a security risk if credentials are compromised.
WiKey resolves this by storing passkeys and secret keys solely on the phone, eliminating backup vulnerabilities.Additionally, current authenticators encounter compliance issues as users may reuse passwords across websites, increasing the risk of data sales. Security systems are only as strong as their weakest point, and current solutions still depend on users creating strong passwords.
Does the system helps to handle inheritance for digital assets, secrets or passwords?
Until now, if someone passed away without leaving instructions on how to access their digital assets or cryptocurrency funds, these could be lost forever.

WiKey solves this with social recovery. Your heirs can ask your helpers to transfer control of the assets to them.For assets that can't be transferred directly, WiKey transfers control without moving them
Why not break the secret key or password to fragments and share it with friends?
Friends can conspire against you, and they might become unavailable or pass away. You may need to keep duplicate copies of the fragments in case friends lose them.If friends store your password on their computers, they could fall victim to phishing or lose part of the secret key

Security related Frequently asked questions

Is using a hardware wallet secure enough?
Hardware wallets still need users to back up and secure their secret phrases, as the wallet could be lost or malfunction.

This reliance on users to hide the secret phrase makes these wallets less secure.Human error, like forgetting where the phrase is stored, or the possibility of hackers or viruses finding it, adds to this vulnerability. As a result, hardware wallets are not as secure as they seem
What sets you apart from other systems that use heuristic analysis to monitor organization cloud traffic, ERP, or mempool for potential hacking events, triggering alarms and potentially halting the attacks
Systems that analyze behavior or rely on irregularities in IP addresses are based on statistics and heuristics. However, smart intruders can often hack into data and secrets within minutes, rendering these systems ineffective in many cases.

WiKey prevents access altogether, ensuring that hackers cannot access your secrets, data or funds from the start. Unlike other systems, WiKey doesn’t rely on statistics or heuristics. Instead, it utilizes robust zero-knowledge cryptography.
This approach allows users to easily log in or operate their wallet using fingerprint or face ID that is never backed up or shared with anyone, while also preventing hackers from uncovering the secret key
Do you support adaptive passwordless?
Adaptive authentication is a method for verifying user identity and authorization levels based on factors such as location, device status, and end user behaviour. Using these contextual factors, adaptive authentication intelligently chooses how a user must authenticate.
With WIKey it’s mandatory to use: BLE to ensure proximity to the desktop or laptopThe WiKey application uses its own relying server in a zero trust mode where all the communication between the authenticator and the client (browser) is encrypted via the noise algorithm. See here for more details see hereThe noise protocol is currently widely implemented in WhatsApp end to end encryption, WireGuard, Lightning, and I2P. A Pin code, face recognition and/or fingerprint which are built into the operating system are used to prevent malicious use of the app.
Does the system helps to handle inheritance for digital assets, secrets or passwords?
Until now, if someone passed away without leaving instructions on how to access their digital assets or cryptocurrency funds, these could be lost forever.

WiKey solves this with social recovery. Your heirs can ask your helpers to transfer control of the assets to them.For assets that can't be transferred directly, WiKey transfers control without moving them
Why not break the secret key or password to fragments and share it with friends?
Friends can conspire against you, and they might become unavailable or pass away. You may need to keep duplicate copies of the fragments in case friends lose them.If friends store your password on their computers, they could fall victim to phishing or lose part of the secret key