Security
Everything related to security what affects the Vultisig Project
Last updated
Was this helpful?
Everything related to security what affects the Vultisig Project
Last updated
Was this helpful?
mobile-tss-lib
1.5 Follow-up
After the draft report (v1.0) was delivered, the client addressed all findings in the following
PRs:
• Audit 1 #17 (commit 06fc76f4d6d34f21fa5d1cafd1eb594d8ac4fdd7)
• Audit 2 #18 (commit 2577eb3b00d4d58a7318fa0ada726ba7965579ab)
While TSS (GG20) is a relatively new cryptographic protocol, it has been extensively tested in the wild by THORChain (thorchain.org) in an open-source and adversarial environment. The fact that it works today with a non-zero amount of funds in vaults is a testament to the robustness of the protocol.
Vultisig also implements GG20, but in a non-adversarial environment. Your trusted devices only connect to each other in deliberate sessions after being unlocked by you or your device owner. Thus, they cannot be attacked while you are asleep with your devices also locked/asleep.
The Threshold Signature Scheme is a relatively new area within the field of Multi-Party Computation. As such, advancements in security and efficiency are ongoing and continuously evolving.
Vultisig closely monitors these developments and is committed to adopting more secure and efficient versions as they become available. Additionally, we are actively researching new possibilities within this space.
The audit was done by for the $VULT contract and can be found .
The audit was done by and can be found .