15% Off Cobo Hardware Wallets
Keystone's large display allows you to fully preview unsigned transaction details, which can prevent a hacker from swapping their receiving addresses in unnoticed. Designing for usability may be the best way to counter phishing attacks and problems like “blind signing”, still the largest security vulnerability among hardware wallets today.
Keystone allows you to split your recovery phrase into three shares, any two of which can be used to reconstitute the entire phrase. We divide your recovery phrase according to the Shamir’s Secret Sharing backup standard SLIP39 provided by SatoshiLabs, and advise you to store the shares in three separate locations to reduce the likelihood of a loss occurring from a single point of failure.
Keystone's Website Terms of Use, Keystone Terms of Use, Privacy Policy & Privacy Promises
A keystone is the most important block in a stone archway, critical to its stability. As the most fundamental tool for securing your financial independence, a hardware wallet is the keystone with which you can build your cryptocurrency citadel.
The team designed Keystone while focusing on two main considerations: delivering uncompromising security that can be depended on in the most extreme circumstances and ensuring ease of use that is not likely to lead to human error.