Security Model

Built on Cryptography,
Not Trust

Kairo Guard uses 2PC-MPC cryptography and on-chain policy enforcement to eliminate single points of failure—without requiring you to trust us.

The Problem with Traditional Wallets

For over a decade, crypto security has relied on a fundamentally flawed model.

$140B+ Lost Forever

Billions in crypto permanently inaccessible due to lost seed phrases, forgotten passwords, and misplaced recovery keys.

Single Point of Failure

Your seed phrase IS your wallet. Anyone who obtains those 12-24 words has complete, irrevocable access to all your funds.

Blind Signing

Most thefts happen because users can't read what they're signing. Malicious approvals drain wallets in seconds.

Core Technology

2PC-MPC: Keys That Never Exist

Two-Party Computation Multi-Party Computation splits your private key between you and a distributed network. The complete key is never reconstructed—not during generation, not during signing, not ever.

Private KeyNEVER EXISTS IN FULLUSER DEVICEKey Share 1(Cannot sign alone)DISTRIBUTED NETWORKKey Share 2(Cannot sign alone)+2PC-MPC: Two parties, each holding one share. Both required to sign.

How It Works

  • 1.Your device holds Key Share 1—generated locally, never leaves your device
  • 2.Distributed network holds Key Share 2—spread across multiple independent nodes
  • 3.Both shares required for every signature—neither can sign alone
  • 4.Partial signatures combine mathematically without revealing shares

Why It's Secure

  • No seed phrase—nothing to lose, steal, or phish
  • Collusion resistant—compromising one party is useless
  • Continuous key rotation—old shares become cryptographically useless
  • Self-custody—you always maintain control, not us
Signing Flow

From Request to Broadcast

Every transaction flows through policy validation and 2PC-MPC signing before reaching the blockchain—all in under 100ms.

STEP 1TransactionRequestUser initiatesSTEP 2PolicyValidationOn-chain rules checkedSTEP 32PC-MPCSigningBoth parties signUser PartialSignatureNetwork PartialSignatureSTEP 4ValidSignatureCombined outputSTEP 5Broadcastto ChainStandard tx on-chainKEY INSIGHTFull key never reconstructedTransaction Signing Flow: Request → Policy Check → 2PC-MPC Sign → Broadcast
Policy Check
2PC-MPC Signing
Approved
Policy Engine

On-Chain Policy Enforcement

Your security rules are stored on Sui and enforced before every signature. Not even Kairo can bypass your policies.

INCOMINGTransactionSend 5 ETHON-CHAIN POLICY ENGINESpending Limit: 10 ETH/dayAddress: WhitelistedContract: Verified SafeALL POLICIES PASSEDAPPROVEDProceed to2PC-MPC Signing<100ms latencyBLOCKED IF VIOLATEDEvery transaction validated against your on-chain policy before signingPolicy Examples:• Daily spend limits• Address whitelists• Time-based rules• Multi-approval thresholds
Spending Limits

Daily, weekly, or per-transaction caps

Whitelists

Only send to approved addresses

Time Delays

Waiting periods for large transfers

Multi-Approval

Require additional signers for high-value

Infrastructure

Distributed Network Architecture

The network key share is distributed across geographically dispersed nodes. No single server failure affects your access.

YOUR DEVICEKey Share 1DISTRIBUTED NETWORKKey Share 2 (distributed)NodeUS-EastNodeEU-WestNodeAPAC+moreANY CHAINEthereumBitcoinSui+ Solana, Cosmos...Single PointDistributed RedundancyChain Agnostic

99.9% Uptime

Redundant nodes ensure the network is always available for signing operations.

Recovery Mechanisms

If Kairo ever goes offline permanently, recovery paths exist to restore your access.

10,000+ Sigs/Sec

Optimized 2PC protocols enable high-frequency operations without compromising security.

Recovery

Recovery Without Seed Phrases

Lost your device? No problem. Kairo's recovery system uses identity verification and timelocks—not a piece of paper.

Designated Recovery Contacts

Pre-approve trusted contacts who can help initiate recovery. No single contact can recover alone—multi-party verification required.

  • Family members, business partners
  • Require 2-of-3 or 3-of-5 approval
  • Contacts can't access funds—only initiate recovery

Timelocked Recovery

Recovery requests include mandatory waiting periods. If someone's trying to steal your account, you have time to cancel.

  • Configurable delay (24h, 48h, 7 days)
  • Notifications when recovery initiated
  • Cancel button if you didn't request it

How Kairo Compares

See how Kairo's security model stacks up against traditional approaches.

FeatureKairoHardwareCustodialTraditional MPCMultisig
Single point of failure
No seed phrase needed
Policy enforcementPartialPartial
Self-custody
Works with existing wallet
Chain agnosticPartial
Recovery without seedPartial
10,000+ sigs/sec

Audits & Verification

Security claims mean nothing without verification. Our code and protocols undergo rigorous third-party review.

Smart Contract Audits

Policy contracts audited by leading security firms

Cryptographic Review

2PC-MPC protocols validated by academic cryptographers

Bug Bounty

Active program for responsible disclosure

Security FAQ

What happens if Kairo goes offline?

The network is distributed across multiple independent nodes with geographic redundancy. If individual nodes fail, others continue operating. In the extreme case of Kairo ceasing operations entirely, recovery mechanisms exist to restore access to your funds through designated recovery contacts and timelocked processes.

Can Kairo access my funds?

No. Kairo holds one key share, but cannot sign transactions without your device's key share. Even if every Kairo employee colluded, they could not move your funds. This is mathematically enforced by the 2PC-MPC protocol.

What if my device is stolen?

A stolen device alone cannot access your funds—the network share is also required. You can initiate recovery from a new device using your pre-configured recovery contacts. The thief would need to compromise both your device AND the distributed network simultaneously.

Is 2PC-MPC new or unproven?

The underlying cryptographic primitives (two-party computation, threshold signatures) have been studied since the 1980s. The specific 2PC-MPC protocols used have been peer-reviewed, formally verified, and deployed in production by institutional custodians. We stand on decades of cryptographic research.

How is this different from multisig?

Multisig requires multiple complete private keys to exist. If any one key is compromised along with another, funds can be stolen. 2PC-MPC ensures no complete key ever exists. Additionally, multisig is chain-specific and visible on-chain, while 2PC-MPC works across all chains and produces standard single-signature transactions.

Can policies be changed without my consent?

No. Policies are stored on-chain (Sui) and can only be modified with a valid signature from your key share. Kairo cannot unilaterally change your policies. You can also add time delays to policy changes for additional security.

Ready for Real Security?

Join the private beta and experience crypto security that doesn't rely on a piece of paper.

© 2026 Kairo Guard. All rights reserved.