PostsCommentsPayoutsvultiwallet (52)in LeoFinance • 8 days agoRE: LeoThread 2025-11-19 00-19Most wallets stop at basic send-and-receive features Vultisig is evolving toward automation, plugin support, and programmable signing logic Custody is the foundation, not the finish linevultiwallet (52)in LeoFinance • 13 days agoRE: LeoThread 2025-11-14 02-48vultiwallet (52)in LeoFinance • 13 days agoRE: LeoThread 2025-11-14 02-48THOSE ARE SCAMS Only legitimate Vultisig airdrops are announced via official channelsvultiwallet (52)in LeoFinance • 13 days agoRE: LeoThread 2025-11-14 02-48Exercise caution when connecting any wallet to a websitevultiwallet (52)in LeoFinance • 16 days agoRE: LeoThread 2025-11-11 04-08The ECDSA protocol moves to Oblivious Transfer plus OT extensions → less crypto bloat, fewer rounds, and latency suited to mobilevultiwallet (52)in LeoFinance • 16 days agoRE: LeoThread 2025-11-11 04-08What makes Vultisig so fast at signing transactions? Rather than GG20's reliance on Paillier homomorphic encryption, Vultisig adopts DKLS23vultiwallet (52)in LeoFinance • 22 days agoRE: LeoThread 2025-11-05 00-27Laptops die. Phones fall into toilets. Life happens. A custody system shouldn’t panic when a device does. Backed-up vaults make sleeping easyvultiwallet (52)in LeoFinance • 24 days agoRE: LeoThread 2025-11-01 18-57yeah those audit examples make sense, default locks and spend limits could prevent a ton of dumb mistakes without the lecturesvultiwallet (52)in LeoFinance • 25 days agoRE: LeoThread 2025-11-01 18-57Vultisig’s strength isn’t that users are perfect — it’s that the system doesn’t break when they’re notvultiwallet (52)in LeoFinance • 25 days agoRE: LeoThread 2025-11-01 18-57Telling people to have better opsec is lazy design Good systems assume people get tired, distracted, pressured, hacked, or carelessvultiwallet (52)in LeoFinance • 26 days agoRE: LeoThread 2025-11-01 03-13Wallets should be designed to cover human mistakesvultiwallet (52)in LeoFinance • 26 days agoRE: LeoThread 2025-11-01 03-13The crypto industry spent 10 years teaching people to memorize 12 random words A simpler question: why design around how humans actually behave? Perfection isn't required to remain securevultiwallet (52)in LeoFinance • 26 days agoRE: LeoThread 2025-11-01 03-13No exchange. No custody risk. No excusesvultiwallet (52)in LeoFinance • 26 days agoRE: LeoThread 2025-11-01 03-13Most people DCA by setting reminders and hoping they'll remember Vultisig vaults don't rely on hope — they execute A DCA plugin is coming. It will allow selecting an asset…vultiwallet (52)in LeoFinance • 27 days agoRE: LeoThread 2025-10-30 20-17If a "secure" wallet can be drained by opening the wrong link, it's not secure Vultisig vaults require signatures from multiple devices No one-click disastersvultiwallet (52)in LeoFinance • 28 days agoRE: LeoThread 2025-10-29 22-16Vultisig is completely transparent Code is available on GitHub Planning happens on Discord Don't trust, verifyvultiwallet (52)in LeoFinance • last monthRE: LeoThread 2025-10-16 00-49The safest system isn't the one without flaws. It's the one where the flaws don't matter — that's the point of threshold cryptography If a vault share is exposed, it remains…vultiwallet (52)in LeoFinance • last monthRE: LeoThread 2025-10-13 21-55When signing, a threshold (e.g., 2-of-3) runs Multi-Party Computation (MPC) and outputs a standard chain signature Built on DKLS23 for faster, fewer-round signing and rock-solid securityvultiwallet (52)in LeoFinance • last monthRE: LeoThread 2025-10-13 21-55During setup, devices create key “shares” via distributed key generation (DKG) and derive a public key. The private key never exists — no seed to back up, no single point of failurevultiwallet (52)in LeoFinance • last monthRE: LeoThread 2025-10-13 21-55How Vultisig uses Threshold Signature Schemes (TSS) to KILL seedphrases: