Cypherock
  • Introduction
  • Design Decisions
    • The balance between security and convenience
    • Cypherock X1 Hardware architecture
      • Using ultrasonic welding for the X1 Vault enclosure
      • Encrypted NFC communication for X1 cards
      • Using Javacards instead of MicroSD
      • Choosing USB vs QR Code
      • Why the X1 cards are not upgradeable
    • Cypherock is BIP39 compliant
    • Private keys should be near to impossible to extract
    • Conflict between trusted parties should not result in unauthorized access
    • Using Shamir Secret Sharing vs. Multi-sig
      • How is Shamir Secret Sharing implemented within Cypherock X1
      • Why Cypherock has a default 2/5 threshold scheme
      • Rejected Key Schemes
    • PIN Protection on Cypherock X1
      • Difference between backing up your PIN vs. Seed Phrase
  • Security Overview
    • Introduction
    • Keylabs - Third Party Security Audit
    • Remote Attacks
    • Physical Attacks
      • $5 Wrench Attack
      • PIN Brute Force Attack
      • Evil Maid Attack
      • Flashing Malicious Firmware
      • Side Channel Attack
      • Supply Chain Attack
  • Cypherock X1 Features
    • Eliminate messy paper backups
    • Open source with secure elements
    • Use Cypherock as a seed phrase vault
    • All-in-one Portfolio Manager
  • Getting Started
    • Download cySync
    • Import Seed Phrase from existing BIP39 compatible wallet
    • Generate a new wallet with Cypherock X1
    • How Cypherock generates your 24-word seed phrase
    • Best practices in keeping your X1 cards secure
      • Use the protective card sleeves
      • Geographical Seperation
      • Choosing your guardians
    • How do I know I am not locked-in to using only Cypherock X1
    • How do I know my Cypherock X1 is genuine?
      • Email 2FA for Product Authentication
    • How to recover your Crypto assets in the case of loss or theft
    • What happens to my Cypherock X1 if Cypherock goes out of business?
Powered by GitBook
On this page

Was this helpful?

  1. Getting Started
  2. Best practices in keeping your X1 cards secure

Geographical Seperation

To maximize security, the X1 Cards should be distributed geographically to prevent an attacker from obtaining any two Cryptographic parts and being able to access the assets secured by the wallet.

Crypto security is still in its nascent stage. As we develop our products, we try to balance convenience with the highest level of security possible. Security experts do not recommend breaking seedphrases into parts and storing them separately since if you lose any one of them and your Crypto assets become unaccessible from the leftover words of the seed phrase. Cypherock X1 cards help solve that problem and in fact, the further the cards are separated, the more secure your Crypto assets become. As further geographic separation helps add a layer of security by making it trickier for attackers to get hold of multiple Cryptographic parts.

Recommended temperature range of X1 cards: -20℃ to +50℃.

As with even your debit and credit cards, users are recommended to not keep X1 Cards exposed to sunlight for long durations. Currently, there is no optimal recommendation that Cypherock has for the management of the X1 Cards because each users' risk profile tends to vary. One common security scheme that we have come across is where the user keeps 1 X1 Card and the X1 Vault in a singular location where the X1 Card could be carried on the user's person, and the X1 Vault be stored in a safe location at home, and the remainder of the X1 Cards could be geographically located in 3 separate locations for example:

  1. 1 X1 Card can be stored in a bank vault

  2. 1 X1 Card can be given to a family member

  3. 1 X1 Card can be handed to a friend

PreviousUse the protective card sleevesNextChoosing your guardians

Last updated 2 years ago

Was this helpful?