Cypherock
  • Introduction
  • Design Decisions
    • The balance between security and convenience
    • Cypherock X1 Hardware architecture
      • Using ultrasonic welding for the X1 Vault enclosure
      • Encrypted NFC communication for X1 cards
      • Using Javacards instead of MicroSD
      • Choosing USB vs QR Code
      • Why the X1 cards are not upgradeable
    • Cypherock is BIP39 compliant
    • Private keys should be near to impossible to extract
    • Conflict between trusted parties should not result in unauthorized access
    • Using Shamir Secret Sharing vs. Multi-sig
      • How is Shamir Secret Sharing implemented within Cypherock X1
      • Why Cypherock has a default 2/5 threshold scheme
      • Rejected Key Schemes
    • PIN Protection on Cypherock X1
      • Difference between backing up your PIN vs. Seed Phrase
  • Security Overview
    • Introduction
    • Keylabs - Third Party Security Audit
    • Remote Attacks
    • Physical Attacks
      • $5 Wrench Attack
      • PIN Brute Force Attack
      • Evil Maid Attack
      • Flashing Malicious Firmware
      • Side Channel Attack
      • Supply Chain Attack
  • Cypherock X1 Features
    • Eliminate messy paper backups
    • Open source with secure elements
    • Use Cypherock as a seed phrase vault
    • All-in-one Portfolio Manager
  • Getting Started
    • Download cySync
    • Import Seed Phrase from existing BIP39 compatible wallet
    • Generate a new wallet with Cypherock X1
    • How Cypherock generates your 24-word seed phrase
    • Best practices in keeping your X1 cards secure
      • Use the protective card sleeves
      • Geographical Seperation
      • Choosing your guardians
    • How do I know I am not locked-in to using only Cypherock X1
    • How do I know my Cypherock X1 is genuine?
      • Email 2FA for Product Authentication
    • How to recover your Crypto assets in the case of loss or theft
    • What happens to my Cypherock X1 if Cypherock goes out of business?
Powered by GitBook
On this page

Was this helpful?

  1. Getting Started
  2. Best practices in keeping your X1 cards secure

Choosing your guardians

With Cypherock X1, you are empowered to safely share your X1 Cards with guardians without the fear of them being able to hack your funds. But at the same time, it is advisable to give custody to people who you trust.

Although selecting a guardian is a highly personal decision and varies from person to person, but it is recommended to keep the following in mind at the time of your decision-making.

  • Trust-worthiness

  • Accessibility

  • Degree of Connection

Also, it is recommended, if you choose to give custody of your X1 Cards to human guardians, you do so only after setting up a PIN on the wallet. Cypherock has a three-layered security framework. These are Decentralized Keys, Distributed locations, and PINs. PIN/ passwords on your wallets act as the ultimate security layer which means, in case an attacker is able to find any two X1 cards, they still won’t be able to hack your Crypto assets until they know about your PIN. Cypherock architecture prevents brute-force attacks on Cypherock X1 by implementing an incremental wait time for wrong pin attempts. Brute-force attempts lock the wallets for up to 100 years.

PreviousGeographical SeperationNextHow do I know I am not locked-in to using only Cypherock X1

Last updated 2 years ago

Was this helpful?