TBTL Cloud Wallet
com.tbtl.idmanager
- No items.
Screenshots
Description
TBTL Cloud Wallet is the best protection from fraud, theft, leakage of private keys or lost passwords.
Compared to other wallets, TBTL Cloud Wallet uses innovative technologies and combines distributed computing with trusted hardware to protect
digital assets. Secret keys are shielded within Trusted Execution Environments such that not even the Cloud Wallet app can access them
directly. Secrets are further distributed across different locations to protect them from threats.
For critical steps such as transaction authorization and policy changes, in addition to traditional security measures, a secure channel is directly
established with the service enclave running inside the Trusted Execution Environment. The mobile device uses the Remote Attestation Protocol
to verify the security of the communication channel, the identity of the service enclave and that the service enclave is indeed running inside a
Trusted Execution Environment.
In addition to protection on the hardware level, every wallet comes with configurable polices, allowing co-management of your digital asset wallet
with daily spending limits and multi-user spending approvals. Your policies are stored alongside your signing keys inside trusted hardware and
cannot be circumvented, not even by us.
HIGHLIGHTS
TRUST BY-DESIGN
Your assets and your data are protected from any kind of external threat, wallet service provider or human error. No one except you has the
access to your wallet or your keys.
CUTTING-EDGE CRYPTOGRAPHY
Eliminating single point of failure as your keys are distributed in different locations. The loss of any part of your key will not compromise your
funds. Your keys are locked inside trusted hardware and controlled by your real world and digital identities.
MULTI-USER MULTI-SIG WALLET
Define daily spending limits & multi-party approvals of transactions.
KEY RECOVERY
Even in the case of theft or loss of your device, access to your funds is possible and ensured through identity verification.
EASY TRANSFERS
You can send funds to your contact’s email address or social network account (Google, Facebook), or by providing your contact’s legal name.
The contact will need to enroll, verify their identity and link the social network account in order to gain control of the funds.