Anchorage Wallets to Provide Users with Smart Storage Functionality via Hardware Security Modules

Anchorage Wallet Fuses Security and Usability

The tradeoff between usability and security on cryptocurrency wallets is a long-standing problem. Custodians of digital assets deal with a couple of issued to decide how to store the assets while offering the user full access to use the coins. The custodian architecture takes up certain risks on your digital assets such as:

  • How much risk your assets are exposed to while in custody
  • How much risk your assets are exposed to when used
  • How quickly you can use your assets, and
  • Whether you can safely participate in on-chain activities like staking and voting.

Hot wallets vs Cold Wallets

The conundrum between hot wallets and cold wallets is a continuing issue in the digital asset industry. Hot wallets are known to allow users easy access to their coins by holding them online. Cold wallets, on the other hand, offers the user higher security by holding the assets offline. In this setting on-demand access to your coins is sacrificed for security on cold wallets while hot wallets tradeoff security for access.*MO-IxZnGq29JZK8D

Anchorage, cold wallets and hot wallets on a security and accessibility chart

This is, however, the trade-off stance is a fallacy as the on-demand accessibility and maximum security are independent. This is how Anchorage Wallets are built, to give the user a secure wallet with no compromise on accessibility.

While hot wallets provide on-demand accessibility, most of the cryptocurrency exchange breaches have been on online wallets. The increase in hacks on online wallets made the cryptocurrency folk to term them as security concerns. The narrative caught on to terming cold wallet storage as safe and secure.

However, cold wallets do not directly assure the custodian of digital assets 100% security of the assets. Holding assets offline does greatly reduce certain kinds of risk, such as the risk of a remote hacker compromising the assets or the risk of private keys being accidentally exposed to the public internet. Other risks such as human error and mistakes are still in play on cold wallet storage hence the need for an even better means of storing clients’ funds.

Hardware Security Modules (HSM)

“HSM is a specialized device that can generate and hold private keys securely, and can use those keys to sign and approve transactions.”

Anchorage development team is working on a custodial architecture using hardware security modules (HSM) enhanced with business logic. The system will prevent hacks on the system by preventing the hackers from using your private key when certain criteria are not met as shown in the figure below.*TNyArToXag8rZy5w

The Anchorage HSM security system

The system uses multiple biometric authentication layers and a unique key to each user that is used to approve any sensitive transaction such as withdrawals, policy changes, etc. The custom business logic verifies the sensitive requests which are then approved by Anchorage and a quorum of clients on the system. This rigorous authentication standard, combined with Anchorage’s transaction review system, means we can provide on-demand private key accessibility for any operation once fully approved.

Get Daily Headlines

Enter Best Email to Get Trending Crypto News & Bitcoin Market Updates

What to Know More?

Join Our Telegram Group to Receive Live Updates on The Latest Blockchain & Crypto News From Your Favorite Projects

Join Our Telegram

Stay Up to Date!

Join us on Twitter to Get The Latest Trading Signals, Blockchain News, and Daily Communication with Crypto Users!

Join Our Twitter

Add comment

E-mail is already registered on the site. Please use the Login form or enter another.

You entered an incorrect username or password

Sorry, you must be logged in to post a comment.
Bitcoin Exchange Guide