You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Embedded Wallet SDKs live solely on the user/application's front-end client and handle the interactions between OAuth providers and the Web3Auth Network.
15
+
The Embedded Wallet SDKs live solely on the user/application's frontend client and handle the interactions between OAuth providers and the Embedded Wallet network.
16
16
17
17
The diagram below describes the relationship between the SDKs and integrating applications. It also depicts the difference between the products that power the infrastructure for a developer-friendly integration.
18
18
@@ -28,15 +28,13 @@ The diagram below describes the relationship between the SDKs and integrating ap
28
28
29
29
## Wallet management infrastructure
30
30
31
-
The [wallet management infrastructure](/embedded-wallets/infrastructure/) enhances security by distributing a user's wallet across various key shares, thereby avoiding direct exposure of seed phrases. These key shares form a 'web of trust' and enable wallet management akin to multi-factor account handling. Users employ OAuth logins, trusted devices, and other factors to manage their cryptographic key pairs. Importantly, the complete private keys are not stored anywhere within the Wallet Infrastructure system, including our databases or any participating nodes.
31
+
The [wallet management infrastructure](./infrastructure/README.mdx) enhances security by distributing a user's wallet across various key shares, thereby avoiding direct exposure of seed phrases. These key shares form a 'web of trust' and enable wallet management akin to multi-factor account handling. Users employ OAuth logins, trusted devices, and other factors to manage their cryptographic key pairs. Importantly, the complete private keys are not stored anywhere within the wallet infrastructure system, including our databases or any participating nodes.
32
32
33
-
To create a social login share, users interact with the Web3Auth Network, where key generation operates via a 5/9 consensus system. This setup guarantees that wallets remain non-custodial, ensuring that neither MetaMask, Social Login Providers, nor any other party holding a key share can claim full ownership.
33
+
To create a social login share, users interact with the Embedded Wallets network, where key generation operates via a 5/9 consensus system. This setup guarantees that wallets remain non-custodial, ensuring that neither MetaMask, social login providers, nor any other party holding a key share can claim full ownership.
34
34
35
35
:::tip managing wallets
36
36
37
-
For managing wallets, our infrastructure uses various cryptographic techniques such as Shamir's Secret Sharing, Threshold Cryptography, and Multi Party Computation.
38
-
39
-
Learn more about [wallet management and the security of our infrastructure](/embedded-wallets/infrastructure/).
37
+
For managing wallets, our infrastructure uses various cryptographic techniques such as [Shamir's Secret Sharing](./infrastructure/sss-architecture.mdx), threshold cryptography, and [Multi Party Computation (MPC)](./infrastructure/mpc-architecture.mdx). To learn more about how we manage wallets, please refer to our [Wallet Management and Security of our Infrastructure](./infrastructure/README.mdx).
40
38
41
39
:::
42
40
@@ -46,9 +44,9 @@ MetaMask Embedded Wallets is not a wallet, but rather a wallet infrastructure th
46
44
47
45
Unlike traditional wallets that can limit user experience, MetaMask Embedded Wallets enables developers to create tailored flows without requiring users to understand complex blockchain concepts. It provides a cryptographic key provider that can be used to build custom wallets or integrate with existing ones through Web3Auth's external wallet adapters.
48
46
49
-
## Is it scalable?
47
+
## Is MetaMask Embedded Wallets scalable?
50
48
51
-
The infrastructure is built to handle millions of users. Our architecture provides:
49
+
The MetaMask Embedded Wallets infrastructure is built to handle millions of users. Our architecture provides:
52
50
53
51
- Global availability across multiple regions with consistent low-latency performance worldwide
54
52
- Automatic horizontal scaling that adjusts capacity based on demand, eliminating bottlenecks and ensuring uninterrupted service
0 commit comments