Blogs for humans

Blogs for humans

Blogs for humans

Preventing Blind Signing with Human Wallet

Mar 10, 2025

$1.4B stolen—exposing the flaws in multi-sigs and cold wallets. In response to the Bybit hack, Holonym is launching Human Wallet for alpha testing, securing against blind signing attacks. It adds a secondary authorization layer using your hardware wallet and provides clear, human-readable threat warnings. Try it in your security workflow today.

Preventing Blind Signing with Human Wallet

Mar 10, 2025

$1.4B stolen—exposing the flaws in multi-sigs and cold wallets. In response to the Bybit hack, Holonym is launching Human Wallet for alpha testing, securing against blind signing attacks. It adds a secondary authorization layer using your hardware wallet and provides clear, human-readable threat warnings. Try it in your security workflow today.

Preventing Blind Signing with Human Wallet

Mar 10, 2025

$1.4B stolen—exposing the flaws in multi-sigs and cold wallets. In response to the Bybit hack, Holonym is launching Human Wallet for alpha testing, securing against blind signing attacks. It adds a secondary authorization layer using your hardware wallet and provides clear, human-readable threat warnings. Try it in your security workflow today.

Preventing Blind Signing with Human Wallet

Mar 10, 2025

$1.4B stolen—exposing the flaws in multi-sigs and cold wallets. In response to the Bybit hack, Holonym is launching Human Wallet for alpha testing, securing against blind signing attacks. It adds a secondary authorization layer using your hardware wallet and provides clear, human-readable threat warnings. Try it in your security workflow today.

Are Self-Custody Wallets Secure Enough for Web3 Adoption?

Jan 12, 2025

Self-custody wallets provide users with independent signing authority, the foundation of true digital ownership. But would you trust your crypto assets to a private key that could be exposed by malware or lost to a simple negligence?

What are Human Keys?

Aug 19, 2024

A next-generation cryptographic system that derives secure, high-entropy keys from private human data, such as passwords, security questions, logins, or uniquely identifying characteristics.

Preventing Blind Signing with Human Wallet

Mar 10, 2025

$1.4B stolen—exposing the flaws in multi-sigs and cold wallets. In response to the Bybit hack, Holonym is launching Human Wallet for alpha testing, securing against blind signing attacks. It adds a secondary authorization layer using your hardware wallet and provides clear, human-readable threat warnings. Try it in your security workflow today.

Are Self-Custody Wallets Secure Enough for Web3 Adoption?

Jan 12, 2025

Self-custody wallets provide users with independent signing authority, the foundation of true digital ownership. But would you trust your crypto assets to a private key that could be exposed by malware or lost to a simple negligence?

What are Human Keys?

Aug 19, 2024

A next-generation cryptographic system that derives secure, high-entropy keys from private human data, such as passwords, security questions, logins, or uniquely identifying characteristics.

Preventing Blind Signing with Human Wallet

Mar 10, 2025

$1.4B stolen—exposing the flaws in multi-sigs and cold wallets. In response to the Bybit hack, Holonym is launching Human Wallet for alpha testing, securing against blind signing attacks. It adds a secondary authorization layer using your hardware wallet and provides clear, human-readable threat warnings. Try it in your security workflow today.