Why Silk is Different

Web3 wallet solutions, especially the WaaS variants, often compromise security (e.g., SIM swaps, centralized key storage) or decentralization (e.g., reliance on third-party services) and the resulting trade-offs prevent serious decentralized projects from scaling effectively.

A New Category of Wallet

Silk has the intuitive UI of a Wallet-as-a-Service (WaaS) but avoids the pitfalls:

  • Web3-Native Business Model: Silk doesn’t rely on SaaS fees. Revenue is tied to activity on the Mishti Network and to user actions such swapping, bridging, gas tank, etc.

  • No Custodial Dependencies: Silk uses 2PC Computation, eliminating single points of failure and ensuring users maintain control of their assets.

  • Multi-Factor Authorizations: Silk marries the ease-of-use of a web2 login with enclave-enforced security policies that can involve simple rules or even 2FA confirmations on other devices.

Built for Developers

Silk is free, permissionless, and designed with developers in mind:

  • Easy Integration: Embed Silk wallets in your app with just a few lines of code — no dashboards, billing systems, or overhead required.

  • Universal Compatibility: Silk provides a universal multi-chain account not tied to a single dApp or ecosystem.

A Secure Foundation for Web3

Silk is powered by cutting-edge cryptographic primitives, including 2-party computation (2PC) and zero-knowledge proofs (ZKPs), delivering the security of a cold wallet with the flexibility of a hot wallet.

  • No Custodians: Silk is fully self-custodial. No company can access your private key.

  • No Trade-Offs: Enjoy enterprise-level security with user-friendly features

Silk runs on a number of cryptographic and distributed computation primitives.

Mishti Network

A scalable decentralized entropy extractor developed by Holonym Foundation. Silk leverages the economic security of Ethereum by using the Mishti Actively Validated Service (AVS) on Eigenlayer to derive private keys for users.

For further technical details, please also see the Mishti Network docs.

2PC (Two-Party Computation)

Robust anti-collusion mechanisms making the network secure for sensitive data. Silk is compatible with Ika (formerly known as dWallet Network / Pera) to provide additional resilience against censorship and enhanced programmability to prevent a myriad of attacks.

ZKPs (Zero Knowledge Proofs)

ZKPs of identity and low-entropy biometrics power our trustless wallet and recovery architecture. Our ZKPs are built on VOLE-in-the-head for efficient client-side computation. Our VitH architecture eliminates leakage of sensitive data from personal devices, unlike typical ZK proving systems that require high computational overhead and third party servers.

On this page