Wealth Security Protocol
Go to Casa Home
  • 🗺️Overview
  • 💜Casa vs. Alternatives
    • Introduction
    • Option #1: Do-it-yourself
    • Option #2: Custodial Storage
    • Option #3: Commercial Systems
  • 🔑System Design Principles
    • Introduction
    • Minimal Knowledge
    • High Security
    • Usability is Security
    • Expert Support
    • Redundancy
    • Sovereignty
    • Incentive Alignment
  • 🚨Threat Overview
    • Introduction
    • Data and Credential Loss
    • Phishing
    • SIM Hijacking
    • Network Attacks
    • Malware
    • Supply Chain Attack
    • Physical Coercion
    • Child/Pet Attack
    • Internal Service Provider Attack
    • Platform / Hosting Provider Attack
    • Code Dependency Attack
    • Official Seizure
    • Inheritance Failure
  • 🔐Chosen Features
    • Introduction
    • Hardware Wallet Signing
    • Multi-signature
    • Multi-location
    • Heterogeneous Hardware and Software
    • Seedless Hardware Wallets
    • Emergency Recovery Key
    • PIN or Biometrics for Mobile Key only
    • PIN for every device
    • Sovereign Recovery Instructions
    • Emergency Lockdown Button
    • Health Check
    • Identity Verification for Account Recovery
    • Inheritance
  • ✅Chosen Key Schemes
    • 5-Key Vault
    • 3-Key Vault
    • Pay Wallet
  • ❌Rejected Key Schemes
    • Shamir's Secret Sharing
    • 2-of-2
    • 1-of-2
  • ❌Rejected Features
    • Biometrics General Usage
    • Brain Wallet -- Memory Based Solutions
  • 🔧Remaining Attack Vectors
    • Address Spoofing
    • Malicious Insider Key Theft
    • Extreme disaster scenarios
    • Extortion
  • 👨‍🚀Future Improvements
    • Taproot/MAST
    • Schnorr Signatures
Powered by GitBook
On this page

Was this helpful?

  1. 🔑System Design Principles

High Security

Casa's 5-key vault is designed to protect large balances ($100,000 to $1 million and up). Since we are securing large balances, our 5-key vault is designed to fill a niche as a premium, high-security product that is more risk-averse than most other competing consumer crypto storage systems.

High security is not “maximum security,” and chasing perfect security is itself a security hazard. More security can always be purchased at a greater cost of money and time. But some of the most involved systems we have seen involve dozens of hours of tedious and error-prone effort to set up. With overly complex systems, there is a danger that users will give up or get lazy momentarily, leaving them less secure. And with added complexity there is increased danger of user error leading to catastrophic loss.

We designed the 5-key vault to protect against as many threats as possible while maintaining an excellent user experience. In many ways, simplicity = security.

We consider not only threats that are present now, but threats that are likely to occur in the future. As the popularity of our 5-key vault grows and/or the value of cryptocurrency increases, the incentives for attackers will also increase. Attacks that are uncommon and unprofitable now will become profitable. We anticipate this while setting our security standard.

PreviousMinimal KnowledgeNextUsability is Security

Last updated 1 year ago

Was this helpful?