✅ If you look at other popular cryptocurrencies, they have one very unpleasant disadvantage. To create a transaction through an official node, you need to upload your private key (wallet.dat file in the case of Bitcoin) or a mnemonic phrase (as in the case of NXT or PRIZM).
✅ Thus, when using the node, the mnemonic phrase / private keys are transmitted to the network. This means, for example, in the event of some kind of attack on the network or collusion of the majority of the node holders, the private keys can be compromised. Given that the blockchain should eliminate the need to trust anyone, this fact is unacceptable.
✅ Therefore, the UMI network uses an alternative solution. To provide the highest possible level of security, the UMI node does not require a mnemonic phrase to make transactions. Moreover, in fact, the network does not imply the ability to create transactions directly through the node at all. Separate libraries / SDKs are responsible for this. By the way, the availability of these tools (libraries) in the public domain greatly simplifies the process of developing wallets and other applications based on UMI.
✅ Thus, the UMI nodes do not transmit the mnemonic phrase to the network in any form. Secret data does not leave the borders of your device and remains safe.
✅ Also, just in case, we remind you that thanks to the encryption algorithm, the mnemonic phrase that you enter when you log in to the UMI wallet cannot be calculated.
No comments:
Post a Comment