Non-Profit Company Proposes to ‘Decentralize’ Crypto Keys Themselves

Published at: Aug. 14, 2019

A new proposal wants to take decentralization a step further by decentralizing the private keys themselves. 

Trusting trustless bot with your crypto private keys

Tide, a non-profit privacy advocate, claims to have developed a decentralized technology, which gives rise to a trustless bot or Delegated Automated Trustee (DAT) on the blockchain. 

According to an announcement on Aug. 5, DAT can act as the custodian of a crypto-key, manage access to personal data or enable automated trading bots to access funds without having access to a full key.

Essentially, the key protecting the data or crypto-assets is divided into several pieces and split between a group of nodes. No single node has access to or knowledge of the whole key, or the authority to act on its own. This makes malicious access to your key virtually impossible.

However, the nodes can act in a swarm to perform functions utilizing the key. The user can specify the parameters upon which this authority can be given.

What’s DAT?

The trustless bot can manage access to personal data, perform decentralized authentication and password or key recovery. Business processes which require ongoing access to crypto-assets, can be granted such access immediately, as long as it falls within defined criteria.

Tide co-founder, Michael Loewy, gave Cointelegraph some examples of the form these criteria can take:

“In the context of the Tide ecosystem those instructions may be a set of rules determining which data fields I’m prepared to trade with certain types of organizations — for example, I don’t want any contact details traded with political organizations. That same concept can also be applied to advanced crypto trading — for example, social trading where my instructions may be to follow or mirror the trades or a peer or expert trader.”

Privacy as a service

Existing centralized solutions which address such situations can be vulnerable, and current automated trading bots require access to your private keys. However, the trustless DAT allows trading bots to run on decentralized exchanges without giving up this information, providing an extra level of security.

One of the benefits of decentralized exchanges is that the user maintains control of their funds and private keys. Using an ordinary bot with full access to those keys reintroduces a central point of attack. As the DAT is trustless, this risk is mitigated.

Maintaining the secrecy of your private keys is essential, as anyone discovering them can get access to your crypto. This is one of the issues facing parties wishing to act as cryptocurrency custodians. The DAT may well be one solution which keeps overall responsibility in the hands of the user, whilst maintaining access for approved functionality.

Tags
Related Posts
Ledger Discloses Five Reported Vulnerabilities in Two Models of Trezor Hardware Wallets
Major hardware wallets manufacturer Ledger has unveiled vulnerabilities in its direct competitor Trezor’s devices, according to a report published on Monday, March. 11. As of press time, Trezor was not immediately available to comment on Ledger’s findings. The study states that the vulnerabilities were found by Attack Lab, the company’s department that hacks into both its own and competitors’ devices to improve security. Ledger claims that it has repeatedly addressed Trezor about weaknesses in their Trezor One and Trezor T wallets, and has decided to make them public after the responsible disclosure period ended. The first issue is related to …
Blockchain / March 11, 2019
Hardware Wallet Doesn’t Store Private Keys to Surpass Cold Storage
A payments technology company has created a hardware wallet that addresses the “flawed approach” used for cold storage — and eliminates the physical storage of private keys. Instead of storing private keys on a device — a “potential security problem” — Bitfi says it has developed technology that does not store any data or private keys. Instead, the company’s hardware uses a deterministic algorithm to calculate the private key at the moment of a transaction. This means that the private key comes into existence for a fraction of a second and vanishes immediately afterward. This technology is meant to overcome …
Blockchain / Feb. 20, 2019
Crypto Wallets Security: Explained
My wallet has been hacked. Help! Since it’s already happened there is not much you can do. Imagine that you’re entering your wallet and seeing no coins and several transactions to unfamiliar addresses. That likely means you’ve been hacked. Due to the anonymous nature of cryptocurrency ‘ownership’ is determined by whoever holds the codes for it. So if it’s gone - in majority cases - it’s gone. You may track the address of the last wallet but it will give you nothing. Notify the company - it's possible you are not the only one - and review your wallet and …
Blockchain / July 15, 2018
Organizations look toward multiparty computation to advance Web3
Protecting user data and private keys is crucial as Web3 advances. Yet, the number of hacks that have occurred within the Web3 space in 2022 alone has been monumental, proving that additional security measures, along with greater forms of decentralization, are still required. As this becomes obvious, a number of organizations have started leveraging multiparty computation, or MPC, to ensure privacy and confidentiality for Web3 platforms. MPC is a cryptographic protocol that utilizes an algorithm across multiple parties. Andrew Masanto, co-founder of Nillion – a Web3 startup specializing in decentralized computation – told Cointelegraph that MPC is unique because no …
Decentralization / Aug. 16, 2022
What are hierarchical deterministic (HD) crypto wallets?
Are HD wallets safe? HD wallets are as secure as the medium (physical or digital) on which they are stored. BIP-32 enables an HD wallet to produce a tree-like hierarchical structure of private keys from the seed. As a result, if a device is lost or destroyed, the seed backup can be used to restore the wallet along with all of the tree’s private keys. Hierarchical deterministic wallets offer enhanced security and privacy compared to non-deterministic wallets. They are secure because a new address is issued for every new transaction. Therefore, hacking them is a challenging and intricate process. Additionally, …
Blockchain / Jan. 19, 2023