PostsCommentsPayoutsvultiwallet (52)in LeoFinance • 9 days agoRE: LeoThread 2025-12-15 09-31haha yeah that's the vibe - feels like Fort Knox with all those layers no single slip-up can take it all downvultiwallet (52)in LeoFinance • 9 days agoRE: LeoThread 2025-12-15 09-31A single compromised device can't drain a Vultisig vault Even if a phone is taken over, additional devices must approve any transaction Threshold security provides protection…vultiwallet (52)in LeoFinance • 22 days agoRE: LeoThread 2025-12-01 21-56Most wallets require protecting the private key If the secret never exists, there's no need to worry about losing itvultiwallet (52)in LeoFinance • 24 days agoRE: LeoThread 2025-11-30 04-01When a vault is created, each of its shares must be backed up A single share cannot sign a transaction on its own, so all shares must be backed up and kept safe in different locationsvultiwallet (52)in LeoFinance • last monthRE: LeoThread 2025-11-19 00-19Most wallets stop at basic send-and-receive features Vultisig is evolving toward automation, plugin support, and programmable signing logic Custody is the foundation, not the finish linevultiwallet (52)in LeoFinance • last monthRE: LeoThread 2025-11-14 02-48vultiwallet (52)in LeoFinance • last monthRE: LeoThread 2025-11-14 02-48THOSE ARE SCAMS Only legitimate Vultisig airdrops are announced via official channelsvultiwallet (52)in LeoFinance • last monthRE: LeoThread 2025-11-14 02-48Exercise caution when connecting any wallet to a websitevultiwallet (52)in LeoFinance • last monthRE: LeoThread 2025-11-11 04-08The ECDSA protocol moves to Oblivious Transfer plus OT extensions → less crypto bloat, fewer rounds, and latency suited to mobilevultiwallet (52)in LeoFinance • last monthRE: LeoThread 2025-11-11 04-08What makes Vultisig so fast at signing transactions? Rather than GG20's reliance on Paillier homomorphic encryption, Vultisig adopts DKLS23vultiwallet (52)in LeoFinance • 2 months agoRE: LeoThread 2025-11-05 00-27Laptops die. Phones fall into toilets. Life happens. A custody system shouldn’t panic when a device does. Backed-up vaults make sleeping easyvultiwallet (52)in LeoFinance • 2 months agoRE: LeoThread 2025-11-01 18-57yeah those audit examples make sense, default locks and spend limits could prevent a ton of dumb mistakes without the lecturesvultiwallet (52)in LeoFinance • 2 months agoRE: LeoThread 2025-11-01 18-57Vultisig’s strength isn’t that users are perfect — it’s that the system doesn’t break when they’re notvultiwallet (52)in LeoFinance • 2 months agoRE: LeoThread 2025-11-01 18-57Telling people to have better opsec is lazy design Good systems assume people get tired, distracted, pressured, hacked, or carelessvultiwallet (52)in LeoFinance • 2 months agoRE: LeoThread 2025-11-01 03-13Wallets should be designed to cover human mistakesvultiwallet (52)in LeoFinance • 2 months agoRE: LeoThread 2025-11-01 03-13The crypto industry spent 10 years teaching people to memorize 12 random words A simpler question: why design around how humans actually behave? Perfection isn't required to remain securevultiwallet (52)in LeoFinance • 2 months agoRE: LeoThread 2025-11-01 03-13No exchange. No custody risk. No excusesvultiwallet (52)in LeoFinance • 2 months agoRE: LeoThread 2025-11-01 03-13Most people DCA by setting reminders and hoping they'll remember Vultisig vaults don't rely on hope — they execute A DCA plugin is coming. It will allow selecting an asset…vultiwallet (52)in LeoFinance • 2 months agoRE: LeoThread 2025-10-30 20-17If a "secure" wallet can be drained by opening the wrong link, it's not secure Vultisig vaults require signatures from multiple devices No one-click disastersvultiwallet (52)in LeoFinance • 2 months agoRE: LeoThread 2025-10-29 22-16Vultisig is completely transparent Code is available on GitHub Planning happens on Discord Don't trust, verify