FailSafe: Advanced Security for Digital Assets
  • Introduction to FailSafe
  • Whitepaper
    • Introduction
      • Defense-in-Depth
      • Forward Security
    • Web3 Threats to Your Crypto
      • The Human Factor: Design with Operator Error in Mind
    • Defense-in-Depth & the Lifecycle of a Transaction
      • Defense 1: de-risk Web3 Asset Positions
      • Defense 2: FailSafe Blockchain Reconnaissance
      • Defense 3: FailSafe Interceptor Service
      • Discussion
    • FailSafe Architecture
      • Forward Security in FailSafe
        • Quantum Threats to EVM-based Blockchains
          • On ECDSA Key Re-use
          • On New Quantum-resilient Alternatives
          • Account Abstraction as a Path to Sunseting ECDSA on Ethereum?
        • Introducing the Quantum Migration Tool (qMig)
          • Assumptions and Goals
          • How Does qMig work?
          • Discussion
          • FailSafe+qMig
    • Conclusion
    • Further Reading
  • How FailSafe helps your Organisation
    • Reduce Attack Surface Area
    • Radar for Security Risks
    • React to Malicious Threats
    • Forward Security against Looming Quantum Computing Threats
  • FailSafe as a tool for Enterprise Risk Management
Powered by GitBook
On this page
  1. Whitepaper

Conclusion

FailSafe is a safety and protection mechanism that is built for a user base that does not necessarily follow best security practices at all times. FailSafe avoids over reliance on any single defense mechanism, if one is bypassed, next one is inline to help minimise losses. This approach spans across the entire lifecycle of a Web3 transaction, from de-risking Web3 asset positions (via auto-rebalancing asset to cold storage) to intercepting the attacker’s transaction via the blockchain mempool, if all other defences failed.

Similarly, with FailSafe’s forward-security, the risk to the user’s Web 3 assets are reduced even if the underlying cryptographic based trust is compromised.

Last updated 2 years ago