No seed phrase. Unlike traditional wallets that derive keys from a 12/24-word seed phrase (BIP-39/44), Dfns wallets have no seed phrase. Each wallet’s key shares are generated independently using MPC protocols. This means there is no single secret to back up or lose.
The Dfns Cloud: Simple & Secure
The standard and most common way to use Dfns is through our fully-managed cloud. This configuration is designed to provide the highest level of security with maximum convenience. Here’s how it works:- Wallet Creation: When you create a new wallet via the Dfns API, our system generates a set of encrypted key shares.
- Secure Storage: All key shares are stored across Dfns’ geographically distributed datacenters. Unlike some MPC providers that give a shard to the user, Dfns manages all shards in secure, purpose-built infrastructure - you don’t need to store or back up any cryptographic material.
- Effortless Operations: You can initiate transactions through a simple API call. The entire complex MPC signing ceremony is handled by the Dfns platform, completely abstracting the cryptographic heavy lifting away from your team.
🔑 The Separation of Keys: A Core Security Principle
A critical aspect of the Dfns architecture is the complete separation between authentication credentials and wallet keys. Understanding this distinction is fundamental to grasping our security model.- Wallet Keys (MPC Key Shares): These are the secret cryptographic shares used exclusively to sign blockchain transactions (e.g., sending ETH or an NFT). They have no ability to authorize actions within the Dfns platform. They are managed entirely by the Dfns MPC protocol.
- Authentication Credentials (API Keys & Tokens): These are what you use to prove your identity and make requests to the Dfns API—for example, to ask the system to create a wallet or initiate a transaction. These credentials cannot sign blockchain transactions directly.
The Secure Signing Process in the Cloud
When you’re ready to send a transaction, a seamless and secure process unfolds in seconds:- API Request: Your application sends an authenticated request to the Dfns API to initiate a transaction from one of your wallets.
- Authentication & Policy Check: Dfns first verifies your authentication credential. It then evaluates the request against any security policies you’ve configured for that wallet, such as spending limits or whitelisted addresses.
- MPC Ceremony: Once the request is authorized, Dfns orchestrates a distributed cryptographic ceremony between the nodes holding the wallet’s key shares. Each node uses its secret share to generate a partial signature.
- Signature & Broadcast: The partial signatures are mathematically combined to create a single, valid transaction signature. This final signature is then broadcast to the appropriate blockchain. The full private key is never revealed or reconstructed at any point.
