We refreshed our doc site!
Bookmarked links may have changed
Read release notesProgrammable Wallets leverage Shamir's secret sharing and secure multi-party computation (MPC) technology to ensure your wallet has the highest level of security. Shamir's secret sharing lets you, the developer, your end users, and Circle each have a key shard that can reconstruct a golden key, which can be used to access the MPC access tokens and sign through three separate MPC nodes. Circle's security model manages the complexity of hosting MPC nodes and enables developers to go to market quickly. The following diagram shows the architecture for user-controlled wallets and how signing works:
We also offer the option for self-hosting MPC nodes for enterprises with higher security needs and the requirement and ability to host and maintain their own MPC nodes.
To further enhance your security settings, we recommend establishing an API call IP allowlist as it:
Note: Neglecting to establish an IP allowlist can expose APIs to exploit from unauthorized IP addresses.