TBTL Cloud Wallet

com.tbtl.idmanager

Total installs
26(26)
Rating
unknown
Released
unknown
Last updated
September 6, 2023
Category
Finance
Developer
tbtl dev
Developer details
Name
tbtl dev
Website
unknown
Country
unknown
Address
unknown
Android SDKs
  • No items.
TBTL Cloud Wallet Header - AppWisp.com

Screenshots

TBTL Cloud Wallet Screenshot 1 - AppWisp.com
TBTL Cloud Wallet Screenshot 2 - AppWisp.com
TBTL Cloud Wallet Screenshot 3 - AppWisp.com
TBTL Cloud Wallet Screenshot 4 - AppWisp.com

Description

TBTL Cloud Wallet is the best protection from fraud, theft, leakage of private keys or lost passwords.

Compared to other wallets, TBTL Cloud Wallet uses innovative technologies and combines distributed computing with trusted hardware to protect
digital assets. Secret keys are shielded within Trusted Execution Environments such that not even the Cloud Wallet app can access them
directly. Secrets are further distributed across different locations to protect them from threats.

For critical steps such as transaction authorization and policy changes, in addition to traditional security measures, a secure channel is directly
established with the service enclave running inside the Trusted Execution Environment. The mobile device uses the Remote Attestation Protocol
to verify the security of the communication channel, the identity of the service enclave and that the service enclave is indeed running inside a
Trusted Execution Environment.

In addition to protection on the hardware level, every wallet comes with configurable polices, allowing co-management of your digital asset wallet
with daily spending limits and multi-user spending approvals. Your policies are stored alongside your signing keys inside trusted hardware and
cannot be circumvented, not even by us.

HIGHLIGHTS

TRUST BY-DESIGN

Your assets and your data are protected from any kind of external threat, wallet service provider or human error. No one except you has the
access to your wallet or your keys.

CUTTING-EDGE CRYPTOGRAPHY

Eliminating single point of failure as your keys are distributed in different locations. The loss of any part of your key will not compromise your
funds. Your keys are locked inside trusted hardware and controlled by your real world and digital identities.

MULTI-USER MULTI-SIG WALLET

Define daily spending limits & multi-party approvals of transactions.

KEY RECOVERY

Even in the case of theft or loss of your device, access to your funds is possible and ensured through identity verification.

EASY TRANSFERS

You can send funds to your contact’s email address or social network account (Google, Facebook), or by providing your contact’s legal name.
The contact will need to enroll, verify their identity and link the social network account in order to gain control of the funds.