Cybersecurity solution for applications based on blockchain infrastructure: general problems and specific solutions point by point

Maxim Zavgorodny, Solution Architect, DataArt

Let’s take a rough look at exactly what high safety standards require for each of these points.

1. Generation of a key and/or seed

[High architecture of multi-signature wallet, fig. 1.1]
[The sequence for using the keys, fig. 1.2]

--

--

Technology Consulting & Solution Design

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store