That’s a great question — and exactly the kind of skepticism that helps push the field forward.
The short answer: No, it’s not just “everything encrypted to your phone.” We use Shamir’s Secret Sharing to split the private key into three pieces (shards). One is stored on your device. The other two are encrypted and stored across decentralized nodes (IPFS). You only need two of the three to recover your key.
We also wrap this with a system we call TKF (Temporal Key Forge) — it evolves the encryption over time and protects against brute-force or quantum attacks.
The user only needs to remember a strong password and have access to their email. We’re trying to make it effortless for non-technical users, while still keeping things non-custodial.
We also wrap this with a system we call TKF (Temporal Key Forge) — it evolves the encryption over time and protects against brute-force or quantum attacks.
The user only needs to remember a strong password and have access to their email. We’re trying to make it effortless for non-technical users, while still keeping things non-custodial.