Concepts & overview

✨ Introducing a collection of cryptographic protocols that allow a silky smooth login for self-custodial authentication and a decentralized wallet solution.

A wallet powered purely by web3 ethos and protocols

Silk runs on a number of cryptographic and distributed computation primitives such as:

  1. Mishti Network, a scalable decentralized entropy extractor developed by Holonym Foundation. Silk leverages the economic security of Ethereum by using the Mishti Actively Validated Service (AVS) on Eigenlayer to derive private keys for users.

  2. 2PC-MPC (Two Party Compute, Multi-Party Computation) provides robust anti-collusion mechanisms making the network secure for sensitive data. Silk is compatible with Pera (formerly the dWallet Network) to provide additional resilience against censorship and enhanced programmability to prevent a myriad of attacks.

  3. ZKPs (Zero Knowledge Proofs) of identity and low-entropy biometrics power our trustless wallet. recovery architecture. Our ZKPs are built on VOLE-in-the-head for efficient client-side computation. Our VitH architecture eliminates leakage of sensitive data from personal devices, unlike typical ZK proving systems that require high computational overhead and third party servers.

Zero Trust by Design

User consent with multi-factor human authentication is at the core of all interactions and capabilities within Silk. Our architectures places zero trust in the security or authenticity of requests from our own servers, third parties, or even the user's device. Plainly speaking, this means that the a key is safe from phishing attacks, front-end exploits, even if the user has malware on their device, or if our very own servers or trusted execution environments get compromised.

It's time for Wallets as a Protocol, not a Service

Your wallet infrastructure should not be dependent on a single point of failure: not the company that provides the service, not the front-end you access it from, and not your memory to keep the seed phrase secure. Today, it's normal to generate your wallet from a social login. This enables 1-click logins but it also gives that social platform control over your wallet. If your twitter account gets hacked, so does your wallet. If your google account is closed down because of "breach of terms" so does your wallet. This works for gaming, or burner wallets, but this doesn't work for self-custody of your data, digital assets, and identity. This is why we built Silk, as the first Wallet as a Protocol built on a web3 native stack that is permissionless, decentralized, and has no single point of failure.

Silk provides users with a protected self-custody wallet solution and offers the best security features in the industry that allow it to be used everywhere, finally making it the first universal embeddable wallet, that can't be censored, shut-down, or acquired by a web2 company.

Last updated