Prevents against SPOF
Our smart split method protects
against a Single Point of Failure
Resistant up to 1400°C
Durable, resistant to temperature of up
to 1400C made out of stainless steel
Multiple layers of security
double-sided plates utilising a 3 by 2 split
method that use a non-human readable format
Prevents against a
single point of failure
We use the smart split (3 by 2 split) mnemonic phrase distribution method which is a popular strategy for securing cryptocurrency wallets. It involves splitting a seed phrase into three parts, then distributing those parts across three separate locations. This provides an added layer of protection against a single point of failure, such as losing one of the seed phrase parts or having them stolen. Even if one of the locations is compromised, the attacker would still need access to the other location to gain access to the wallet. Overall, the smart split mnemonic phrase distribution method is a recommended best practice for anyone looking to secure their cryptocurrency assets.
Compatible with major wallets

Why do we consider the smart split (3 by 2) method as the safest and most optimal approach?
- Primarily, it protects against a single point of failure, enhancing overall security.
- While some experts recommend using a passphrase, it's important to note that not all wallets support this feature.
- We don't disregard the use of passphrases entirely; however, if used incorrectly, they can potentially lead to more harm than good.
- This method presents an ideal solution for individuals who are less familiar with advanced technical concepts, ensuring simplicity without compromising security.
Feel safe against

Intruder

Fire

Flood

Earthquake
Important security notes
- While using the booklet to search for the codes, avoid leaving any marks next to the words. Leaving marks may unintentionally expose your seed words.
- Keep each of the plate in 3 different easy to access secured locations.
- We don't disregard the use of passphrases entirely; however, if used incorrectly, they can potentially lead to more harm than good.
- This method presents an ideal solution for individuals who are less familiar with advanced technical concepts, ensuring simplicity without compromising security.