Security

Security

How WaaP keeps your funds safe.

Two-Party Computation (2PC)

Your private key never exists in one place. WaaP splits signing authority:

ShareLocationCan sign alone?
Your shareYour deviceNo
Network shareDecentralized networkNo

Both shares are required to sign any transaction. This means:

  • If your device is compromised, attackers can't move funds
  • If the network is compromised, attackers can't move funds
  • Only you can authorize transactions

No Seed Phrases

Seed phrases are the #1 attack vector in crypto. WaaP eliminates them entirely:

  • Nothing to write down
  • Nothing to store insecurely
  • Nothing to get phished

Transaction Scanning

Before you sign, WaaP scans transactions for:

  • Malicious contracts
  • Phishing attempts
  • Unusual patterns

Powered by Blockaid (opens in a new tab) security infrastructure.

Recovery

Lost access to your login method? WaaP supports multiple recovery paths:

  • Additional verified login methods
  • Recovery contacts
  • Time-delayed recovery

Learn more about recovery