Meet Vault12 at the Mansion House Summit in London, September 13, 2024.
Library
Access Vault12’s Library for comprehensive resources on cryptocurrency security. Learn about protecting your digital assets with expert guides and valuable insights.
Glossary
Common terms and definitions used when describing cryptocurrency, blockchain and security.
How to Secure, Back Up, and Protect NFTs
Today, NFTs are enabling creators to revolutionize art, but they also enable additional use cases, including support for many types of unique physical and digital goods, such as concert tickets and identity documents.
Part 1: The Cryptography behind Vault12
Terence Spies on the cryptography in Vault12.
Part 2: The Cryptography behind Vault12
Terence Spies on the cryptography in Vault12.
Part 3: Vault12 In Action
See the Vault12 app in action.
Part 2: How it Works
See how Vault12 works.
Szabo, Nick (2001). “Trusted Third Parties Are Security Holes,”
Szabo, Nick (2001). "Trusted Third Parties Are Security Holes,"
Tassa, Tamir. “Hierarchical Threshold Secret Sharing,”
Tassa, Tamir. "Hierarchical Threshold Secret Sharing,"
Shamir's Secret Sharing (SSS) White paper
Shamir, A. (1979). "How to Share a Secret,"
Introducing Vault12 Community Rewards
Allocated 80,000,000 tokens to be used over the next five years for Community Rewards.