Use Cases: Bring Your Own Wallet

Last time we took a look at the idea behind Decentralized Digital Asset Custody and how users can count on all the benefits they expect from a centralized custody solution without the risks that are associated with it. All of this is thanks to Odsy’s implementation of Distributed Key…

Use Cases: Decentralized Digital Asset Custody

We’re now familiar with the Odsy tech stack. The network combines multi-chain compatibility, Turing-complete programmability, and MPC-based security to create a single, decentralized access control layer for all of crypto and web3. But what can we do with that? A lot. The dWallets that are deployable on the network…

The Odsy Tech Stack: Turing-Complete Wallet Contracts

We’ve seen how dWallets are both capable of operating across chains thanks to their support for signing mechanisms such as ECDSA. They are also capable of providing unparalleled security thanks to the Odsy Network’s particular implementation of TSS. Altogether, this allows developers to build an entirely new kind…

The Odsy Tech Stack: Digital Signature Algorithms

So we’re starting to get an idea of what dWallets are. We’re also getting a better understanding of the new capabilities they have because they run on their own decentralized network — the Odsy Network. This dedicated network is what allows dWallets to be: * Programmable, * Secure, and * Cross-chain compatible…

What Are dWallets and Why Your Users Will Want One

“Wallets” can mean different things in web3. Usually, they’re understood as the interfaces where users keep track of their assets, sign in to dApps, and create or approve transactions. They could even be seen as a web3 analogy to a browser and many popular wallet applications are, in fact,…