Content
@
https://warpcast.com/~/channel/embeddedwallets
0 reply
0 recast
0 reaction
Henri Stern Ꙫ
@henri
Beyond cryptosystem architecture and infra, ask how your provider connects wallets to users. Many attack vectors on wallet systems target auth (eg phishing) rather than cryptosystems. Enabling strong, extensible auth for wallets is a cornerstone of secure systems at Privy.
1 reply
4 recasts
49 reactions
MAGNETIC
@magnetic
Onchain and decentralisation is the future with valid authentication and authorisation 🦾
0 reply
0 recast
0 reaction