Skip to content

Commit 1dbbd27

Browse files
2483d embedded wallets pass (#2603)
* reviews infrastructure section * reviews infrastructure section * completes first pass of review, several items wip, see inline comments * puts table differentiator into play * rmvs partial from front matter * fix for merge conflict * completes review round --------- Co-authored-by: Yashovardhan Agrawal <yashovardhan.agrawal@gmail.com>
1 parent ddc6a81 commit 1dbbd27

File tree

13 files changed

+309
-208
lines changed

13 files changed

+309
-208
lines changed

docusaurus.config.js

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -803,6 +803,14 @@ const config = {
803803
},
804804
},
805805
}),
806+
stylesheets: [
807+
{
808+
href: "https://cdn.jsdelivr.net/npm/katex@0.16.25/dist/katex.min.css",
809+
type: "text/css",
810+
integrity: "sha384-WcoG4HRXMzYzfCgiyfrySxx90XSl2rxY5mnVY5TwtWE6KLrArNKn0T/mOgNL0Mmi",
811+
crossorigin: "anonymous",
812+
},
813+
],
806814
}
807815

808816
module.exports = config
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
| SDK Family | Key Model | Available from |
2+
| ---------- | --------- | -------------- |
3+
| [**Embedded Wallet SDKs**](/embedded-wallets/sdk/) | [SSS](/embedded-wallets/infrastructure/sss-architecture) <br/>(key reconstruction) | [Base, Growth, and Scale plans](https://web3auth.io/pricing.html) |
4+
| **MPC Core Kit SDK** | [TSS/MPC](/embedded-wallets/infrastructure/mpc-architecture#threshold-signature-scheme-key) <br/> (no key reconstruction) | [Enterprise plan](https://web3auth.io/pricing.html) |
5+

embedded-wallets/how-it-works.mdx

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: How do Embedded Wallets work?
2+
title: How Embedded Wallets Work
33
image: 'img/metamaskog.jpg'
44
sidebar_label: How it works
55
description: 'How MetaMask Embedded Wallets Work? | Documentation - Embedded Wallets'
@@ -12,7 +12,7 @@ MetaMask Embedded Wallets (formerly Web3Auth) operate as wallet infrastructure,
1212

1313
## High-level architecture
1414

15-
The Embedded Wallet SDKs live solely on the user/application's front-end client and handle the interactions between OAuth providers and the Web3Auth Network.
15+
The Embedded Wallet SDKs live solely on the user/application's frontend client and handle the interactions between OAuth providers and the Embedded Wallet network.
1616

1717
The diagram below describes the relationship between the SDKs and integrating applications. It also depicts the difference between the products that power the infrastructure for a developer-friendly integration.
1818

@@ -28,15 +28,13 @@ The diagram below describes the relationship between the SDKs and integrating ap
2828

2929
## Wallet management infrastructure
3030

31-
The [wallet management infrastructure](/embedded-wallets/infrastructure/) enhances security by distributing a user's wallet across various key shares, thereby avoiding direct exposure of seed phrases. These key shares form a 'web of trust' and enable wallet management akin to multi-factor account handling. Users employ OAuth logins, trusted devices, and other factors to manage their cryptographic key pairs. Importantly, the complete private keys are not stored anywhere within the Wallet Infrastructure system, including our databases or any participating nodes.
31+
The [wallet management infrastructure](./infrastructure/README.mdx) enhances security by distributing a user's wallet across various key shares, thereby avoiding direct exposure of seed phrases. These key shares form a 'web of trust' and enable wallet management akin to multi-factor account handling. Users employ OAuth logins, trusted devices, and other factors to manage their cryptographic key pairs. Importantly, the complete private keys are not stored anywhere within the wallet infrastructure system, including our databases or any participating nodes.
3232

33-
To create a social login share, users interact with the Web3Auth Network, where key generation operates via a 5/9 consensus system. This setup guarantees that wallets remain non-custodial, ensuring that neither MetaMask, Social Login Providers, nor any other party holding a key share can claim full ownership.
33+
To create a social login share, users interact with the Embedded Wallets network, where key generation operates via a 5/9 consensus system. This setup guarantees that wallets remain non-custodial, ensuring that neither MetaMask, social login providers, nor any other party holding a key share can claim full ownership.
3434

3535
:::tip managing wallets
3636

37-
For managing wallets, our infrastructure uses various cryptographic techniques such as Shamir's Secret Sharing, Threshold Cryptography, and Multi Party Computation.
38-
39-
Learn more about [wallet management and the security of our infrastructure](/embedded-wallets/infrastructure/).
37+
For managing wallets, our infrastructure uses various cryptographic techniques such as [Shamir's Secret Sharing](./infrastructure/sss-architecture.mdx), threshold cryptography, and [Multi Party Computation (MPC)](./infrastructure/mpc-architecture.mdx). To learn more about how we manage wallets, please refer to our [Wallet Management and Security of our Infrastructure](./infrastructure/README.mdx).
4038

4139
:::
4240

@@ -46,9 +44,9 @@ MetaMask Embedded Wallets is not a wallet, but rather a wallet infrastructure th
4644

4745
Unlike traditional wallets that can limit user experience, MetaMask Embedded Wallets enables developers to create tailored flows without requiring users to understand complex blockchain concepts. It provides a cryptographic key provider that can be used to build custom wallets or integrate with existing ones through Web3Auth's external wallet adapters.
4846

49-
## Is it scalable?
47+
## Is MetaMask Embedded Wallets scalable?
5048

51-
The infrastructure is built to handle millions of users. Our architecture provides:
49+
The MetaMask Embedded Wallets infrastructure is built to handle millions of users. Our architecture provides:
5250

5351
- Global availability across multiple regions with consistent low-latency performance worldwide
5452
- Automatic horizontal scaling that adjusts capacity based on demand, eliminating bottlenecks and ensuring uninterrupted service

0 commit comments

Comments
 (0)