Security is the fundamental building block of any crypto wallet. As pioneers of a new approach to security, we want to share how we designed our industry-leading system. 

Using secure MPC and threshold signatures, we’ve replaced the traditional private key with two independently created mathematical secret shares. One share is stored on your mobile device, and the other is on the ZenGo server. Those shares are never exposed to each other at no time. With no single point of failure, even if something happens to one of the shares, your assets are always safe. 

Unlike with exchanges (like FTX or Blockfi), only you can initiate and make a transaction in crypto. ZenGo cannot access your funds. To send funds, you initiate a process in which the server and device shares communicate to sign the transaction without ever revealing their secrets to each other. 

Backing up your wallet is just as simple. An encrypted copy of your device secret share is stored on the ZenGo server (which we cannot use), and the decryption code is stored separately in your personal cloud account (eg, iCloud/ google drive / dropbox). Only with your biometric face scan can you access the encrypted share.  

It only takes a few seconds to recover your wallet if you delete the app, lose your phone, or want to use ZenGo on a new device. Just scan your face, and the encrypted device share is then decrypted on your device. 

Our keyless security model removes the single point of failure of traditional cryptocurrency management solutions and frees you from ever having to worry about private keys again. And we also made sure it was easier to use than any other option

You can read more about our security model here

Can I lose my account if someone gets hold of my email or my iCloud or google drive account? 

No.

ZenGo authentication requires 3 security factors you control, including the email, the cloud of your choice, and the secure selfie biometric scan. If an attacker got access to your email or your cloud recovery kit, they would not be able to recover and access your ZenGo account because the biometrics selfie would be required

Can I lose my account if I lose my phone?

No.

As long as you have your email, cloud and pass the selfie biometrics, you will always be able to recover your account on the same or different phone; You can also recover your account by moving from iPhone to Android by using Google Drive with your ZenGo recovery kit

Can ZenGo access and use my funds?

No, never.

ZenGo is self-custodial and requires 3 security factors to access an account that ZenGo does not have. ZenGo does not have access to the device secret share on your mobile phone, which would be necessary to access your account.

Can I lose access to my ZenGo account if my face changes?

ZenGo gives you additional security by allowing you to add a second trusted selfie to recover your account. Should your face change meaningfully, you would be able to recover your account with the assistance of that person

You can always test your current selfie biometrics, and minor changes like natural aging, a scar, or a light beard do not have any impact.

Can ZenGo selfie biometrics be cracked with a picture or even a 3D mask?

No. The technology used is resistant to the most sophisticated spoofing attacks

Was ZenGo ever hacked?

No. We operate since 2018 successfully

Was ZenGo security audited?

Yes. We regularly perform formal and external security audits on our apps made by reputable firms. Our MPC cryptography is open-source, audited and peer-reviewed

Is MPC cryptography truly secure?

MPC (or multi-party computation) is a reputable field of cryptography that is used by the largest institutions like banks to protect and secure very large amounts of funds. It is considered secure because, unlike public/private key cryptography, it operates without a systemic single point of failure and has been battle-tested for years.

That said, like every field of security, there are certain risks associated to MPC. This is why our cryptography is open-source, audited and peer-reviewed

Can I lose my crypto if ZenGo stops operating?

No. ZenGo offers a guaranteed access service performed by independent companies should that be needed

If I lose access to my email or cloud service, can I recover my account on a new phone?

ZenGo offers the option to add a secondary email and secondary cloud so that you never lose access to your account if your primary email or cloud is lost. If you still have access to an old device with ZenGo on it, you can always easily add a secondary email or cloud backup.

Are there any risks in using ZenGo?

ZenGo has one of the most robust security systems in the industry and has never been hacked since 2018,

However, any app or wallet security systems always have certain limits, and it is important to understand those limits before using them. We want to state some of those in plain English.

  1. ZenGo allows you always to recover your account even if you lost or break your phone. However, you will not be able to recover your account if you miss one of the 3 original security parameters of your ZenGo account: your email, your cloud recovery kit, and successful selfie biometrics. ZenGo provides an option to add a secondary option for all 3 parameters (a secondary email, a secondary cloud recovery kit, and a secondary trusted selfie ).

  2. If you send crypto to the wrong address or to a scammer, you will not be able to cancel or reverse that transaction

  3. You can always delete your ZenGo account should you choose to from within the app. If you delete your ZenGo account, all your records will be permanently deleted, and your account will be inaccessible, including the wallet addresses and funds and any future transactions associated with it. If later, you decide to create another account with the same email, a brand new account and address will be provided, and former records will not be accessible.

  4. ZenGo has a built-in web3 firewall to inform you and protect your interactions with blockchain apps and avoid potential wallet drainers and scams. Scammers always come up with new ways to mislead users, and it is always recommended to verify the legitimacy of the apps you are using.

  5. ZenGo, the company, could one day stop operating and be unable to co-sign transactions, but this risk is mitigated by our guaranteed access service operated by independent parties allowing you to access and spend your crypto even without ZenGo.

  6. ZenGo is a mobile app present in the Apple and Google app store. Those platforms could decide to ban certain apps as they did in the past in other categories. However, even without being distributed in an app store, the ZenGo app installed on your phone would still work so that you can access your funds.

Did this answer your question?