Content pfp
Content
@
https://warpcast.com/~/channel/embeddedwallets
0 reply
0 recast
0 reaction

Henri Stern Ꙫ pfp
Henri Stern Ꙫ
@henri
Beyond cryptosystem architecture and infra, ask how your provider connects wallets to users. Many attack vectors on wallet systems target auth (eg phishing) rather than cryptosystems. Enabling strong, extensible auth for wallets is a cornerstone of secure systems at Privy.
1 reply
2 recasts
38 reactions

jack jon pfp
jack jon
@jackjon
People don’t hack math. They hack people. Auth is where the real war is.
0 reply
0 recast
0 reaction