Connect your hardware wallet or sign in to your account.
Don't have an account? Sign up here.
In an age where digital assets are as valuable as physical ones, security is not just a feature—it's the foundation. Standard logins, based on passwords and emails, are susceptible to a myriad of attacks, from phishing to brute-force guessing. Your financial sovereignty demands a new paradigm.
This portal utilizes a security model inspired by industry-leading hardware wallets, ensuring that the private keys that control your assets never, ever leave your possession. By authenticating with a physical device, you introduce an air-gapped layer of security that is mathematically impossible for a remote attacker to breach. You are not just logging in; you are providing cryptographic proof of your identity, a proof that only you can generate.
Our primary authentication method integrates directly with your hardware wallet. This means your private keys—the only thing that matters—are stored in a specialized, offline chip designed to be impenetrable. They never touch your computer or the internet, making them immune to keyloggers, malware, and remote hackers.
True security means you are in control. Every critical action, from logging in to authorizing a transfer, must be physically confirmed on your device's trusted screen. You see exactly what you are approving, eliminating the risk of "blind signing" where malware might swap a recipient's address behind the scenes.
Your device is a key, but it's not the lock. If your device is ever lost, stolen, or damaged, your assets are not gone. During your initial setup, you create a unique 12 or 24-word recovery seed. This seed is the master backup of your private keys. Store it offline, in a secure place, and you will always be able to restore full access to your funds.
A hardware-based login is a method of authentication that uses a physical device (like a Trezor or Ledger) as your primary key. Instead of typing a password that can be stolen, you connect your device and physically approve the login request. The device uses its offline private key to "sign" a unique challenge from our server, proving it's you without ever revealing the key itself. It is widely considered the gold standard for digital asset security, far surpassing traditional passwords or even two-factor authentication (2FA) apps, which can still be phished.
While connecting a hardware device is the highly recommended method and unlocks the full security potential of the platform, we also provide a standard account system with an email and password. This is offered for convenience and for users who may not yet own a hardware wallet. However, if you choose this method, we strongly urge you to use an extremely strong, unique password (preferably generated by a password manager) and to enable all available two-factor authentication options in your account settings as soon as you sign in.
This is a common and critical question. Your funds are absolutely NOT lost. It is essential to understand that your crypto assets are not stored *on* the hardware device itself; they exist on the blockchain. The device simply holds the private keys that *prove you own* those assets. When you first set up your device, you were prompted to write down a 12 or 24-word "recovery seed." This seed is the master key to all your accounts. If your device is lost, stolen, or broken, you can simply purchase a new hardware wallet (from any compatible brand), select the "Restore" option, and enter your recovery seed. You will regain full access to all your assets. This is why protecting your recovery seed—keeping it offline and safe from fire or theft—is the most important step you can take.
Password managers are excellent tools and a massive improvement over reusing weak passwords. However, they still store your "keys" (passwords) in a file that is on an internet-connected device. If your computer is compromised with sophisticated malware, or if your password manager's master password is stolen, an attacker could gain access. A hardware wallet is fundamentally different. It operates on the principle of "something you have" (the physical device) versus "something you know" (a password). The private key *never* leaves the device's secure chip, so even if your computer is completely infected with viruses, the malware has no key to steal. It can only ask the device for a signature, which you can then physically deny on the device's screen.
Yes. The entire system is designed around the principle of zero trust. When you use your hardware device, we never see your private key. We send your device a random piece of data (a "challenge"), and your device signs it. We can then verify that signature belongs to your public key, confirming your identity. We never have access to the key itself, so we cannot spend your funds, and even in the unlikely event of a server breach, attackers would not find any private keys. For standard email/password accounts, we use industry-standard hashing and salting algorithms (like Argon2 or bcrypt) to protect your password, ensuring even we cannot read it. All communication is, of course, encrypted with SSL/TLS.