🌟 Photo Sharing Tips: How to Stand Out and Win?
1.Highlight Gate Elements: Include Gate logo, app screens, merchandise or event collab products.
2.Keep it Clear: Use bright, focused photos with simple backgrounds. Show Gate moments in daily life, travel, sports, etc.
3.Add Creative Flair: Creative shots, vlogs, hand-drawn art, or DIY works will stand out! Try a special [You and Gate] pose.
4.Share Your Story: Sincere captions about your memories, growth, or wishes with Gate add an extra touch and impress the judges.
5.Share on Multiple Platforms: Posting on Twitter (X) boosts your exposure an
Web3 security experts discuss new solutions for wallet and custody security from a hardware perspective.
Web3 Security Experts Discuss Wallet and Accomplice Security from a Hardware Perspective
Recently, at a global Web3 and AI summit, a group of industry experts engaged in an in-depth discussion on the topic of "Web3 Wallet and Accomplice Security." This roundtable forum explored ways to build a more secure and scalable Web3 asset protection mechanism from the underlying perspective of hardware and system software.
The guests participating in the discussion included executives and founders from several well-known technology companies. They exchanged views on topics such as the pain points of user security in Web3, advanced custodial architecture, and the challenges and breakthroughs of the open-source ecosystem.
The forum host pointed out at the beginning that the current discussions on Web3 security are mostly focused on on-chain protocols and smart contracts, while the decisive role of underlying hardware and system architecture is often overlooked. He emphasized that private key accomplice and Web3 Wallet security highly depend on the safety of devices and hardware, but discussions in this area are not common.
Experts from a well-known technology company shared their team's technical architecture in high-security digital asset custody, including the EAL5+-based partitioning and cold storage signing process, as well as how to provide support for an offline signing orchestrator system for bank-grade custody services.
Another participant pointed out that the existing custody models "entrusted custody" and "self-custody" both have systemic risks through examples. He introduced a solution based on "distributed custody" and MPC-TSS technology, emphasizing the application value of a flexible and scalable signature structure for enterprise and individual users.
A founder focused on open source technology shared his team's practical experience in multi-terminal computing and local security isolation, and called on the industry to think more systematically about the openness and trustworthiness of the underlying architecture while ensuring user experience.
Hardware Security Module (HSM) and key management experts analyzed the key bottlenecks and response strategies in current hardware custody solutions. He stated that the hardware trust boundary is crucial when building global digital asset infrastructure.
In discussing the future form of Web3 Wallets, participants generally believe that a composable, modular multi-signature architecture will become the mainstream trend, and balancing user experience with security is the core challenge. An expert added that financial enterprises have become accustomed to using dedicated hardware for private key and signature management, but the level of security these systems provide for digital assets still needs to be audited by professional blockchain security companies. He pointed out that "accomplice" is essentially an architectural design issue, and an ideal custodial solution should effectively prevent operational errors through system mechanisms while ensuring users have a moderate degree of operational freedom.
Regarding the role of open-source software in Web3 hosting, the participants expressed a cautiously optimistic attitude. Some pointed out the legal gaps and market barriers facing open-source chip design, calling for the industry to further enhance security transparency. Other experts discussed how to achieve module-level open-source isolation without sacrificing performance, starting from the perspective of operating system-level security.
At the end of the forum, the host summarized: "The underlying technology of private key custody and wallets is still evolving, and we look forward to providing verifiable and user-trusted security solutions through cooperation in the future."
The purpose of this roundtable forum is to collaborate with global cybersecurity practitioners in the context of increasingly clear regulations and increasingly complex technology, providing cross-layer collaborative security solutions for developers, enterprises, and regulatory agencies.