πWallet Security
How Private keys are handled and kept safe on Zenith
How Zenith stores private keys
At Zenith, the security of your private keys is our top priority. When you generate or import a wallet, the private key is securely stored in your device's LocalStorage and is never sent to our backend. We use it solely to sign and send transactions on the front-end, with transaction data processed without needing the private key. The integrity of your private keys could only be compromised by malware on your device or accidental exposure by the user. It's crucial to stay vigilant against insecure browser extensions and avoid downloading suspicious software to prevent unauthorized access to your private keys.
Enhanced Security Measures
To fortify your security, Zenith introduces an additional layer of protection. Users can set a unique password, which is used to hash the private keys. This password is stored securely on our backend, and users can retrieve it by verifying ownership of the manager wallet through a signature. It's important to note that even with this password, Zenith cannot access your private keys as we do not possess the hashed data. This system ensures that even if malicious software manages to access the hashed private keys in your localStorage, they won't have the decryption key. Our innovative security measures are designed to safeguard your assets at every step.
Visual Guide to Our Security Process
For a clearer understanding of our security protocol, please refer to the accompanying diagram that outlines the flow of this process.
Last updated