Skip to content

Commit

Permalink
Change naming of custody key to spend key
Browse files Browse the repository at this point in the history
  • Loading branch information
danieljperry committed Dec 18, 2024
1 parent f40d457 commit 62b5116
Show file tree
Hide file tree
Showing 2 changed files with 8 additions and 8 deletions.
12 changes: 6 additions & 6 deletions docs/getting-started/cloud-wallet/faq.md
Original file line number Diff line number Diff line change
Expand Up @@ -72,7 +72,7 @@ In the reference wallet, the key used for signing transactions is located on the

We plan to release three tiers with the Cloud Wallet:

- Free Tier – currently available, albeit in beta form. It includes one vault, with a single custody key and a single recovery key. The free tier will provide easy onboarding for new users, and will offer a more secure solution than what exists in most of the industry.
- Free Tier – currently available, albeit in beta form. It includes one vault, with a single key for spending and a single key for recovery. The free tier will provide easy onboarding for new users, and will offer a more secure solution than what exists in most of the industry.
- Prosumer Tier (coming soon) – will include support for multisig vaults, as well as some advanced trading tools. This will be the perfect solution for individuals and small groups who want to share custody, as well as for high-frequency traders. It will be available for a monthly fee.
- Enterprise Tier (coming soon) – will provide custody, management, and support solutions for large enterprises.

Expand All @@ -92,19 +92,19 @@ If you discover any security issues, you can file a report on our [bug bounty si

## Recovery

### What happens if I lose my custody key?
### What happens if I lose my spend key?

You can use your recovery key to swap out the lost key for a new one.

### What happens if my custody key is stolen? Will all of my funds be stolen?
### What happens if my spend key is stolen? Will all of my funds be stolen?

It depends. For example, the Chia Signer app recommends using biometric authentication such as a fingerprint or face ID. With this setup, if a thief steals your phone, they will not be able to access the Chia Signer app, and thus your funds will remain secure. You can procure a new smartphone and initiate the recovery process in order to restore your funds.

However, the current setup is not secure against wrench attacks, where the thief forces you to use your biometrics to sign a transaction to steal all of your funds. Our upcoming multisig solution will be secure against such attacks, as will our longer-term custody solution.

### What happens if I lose my recovery key?

You can use your custody key to send your funds to a new vault.
You can use your spend key to send your funds to a new vault.

### What happens if my recovery key is stolen? Will all of my funds be stolen?

Expand All @@ -128,7 +128,7 @@ Yes! The Chia blockchain is a public ledger, so anyone can build software to mon

### What is the Chia Signer app?

The Chia Signer app turns your smartphone into a hardware wallet. The app uses your phone's Secure Enclave to create a vault custody key. This key cannot be removed from the device, so a thief would need to gain physical access to your phone in order to steal it. You can download it from the [iOS App Store](https://apps.apple.com/app/chia-signer/id6504493785).
The Chia Signer app turns your smartphone into a hardware wallet. The app uses your phone's Secure Enclave to create a vault spend key. This key cannot be removed from the device, so a thief would need to gain physical access to your phone in order to steal it. You can download it from the [iOS App Store](https://apps.apple.com/app/chia-signer/id6504493785).

:::info

Expand Down Expand Up @@ -179,7 +179,7 @@ No. CNI won't custody any of your assets, so it won't have the ability to freeze

### What risks do end users take regarding CNI's control of the Cloud Wallet website?

One of the advantages of using vaults is that their custody keys are not directly accessible to the website or its APIs.
One of the advantages of using vaults is that their spend keys are not directly accessible to the website or its APIs.

The two risks for Cloud Wallet end users are:

Expand Down
4 changes: 2 additions & 2 deletions docs/getting-started/cloud-wallet/tooltips.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,9 +10,9 @@ This page contains tooltip links from the Cloud Wallet. It provides some basic i

## Recovery

This is the process of rekeying a vault. If your custody key is lost or stolen, you can swap it out for a new one. For example, if someone steals your smartphone where your Chia Signer app is installed, you can obtain a new phone, install the Chia Signer app, and create a new hardware key. You can then instruct your vault to replace the stolen key with the new one. The recovery process also allows you to change your recovery key if desired.
This is the process of rekeying a vault. If your spend key is lost or stolen, you can swap it out for a new one. For example, if someone steals your smartphone where your Chia Signer app is installed, you can obtain a new phone, install the Chia Signer app, and create a new hardware key. You can then instruct your vault to replace the stolen key with the new one. The recovery process also allows you to change your recovery key if desired.

## Custody Key
## Spend Key

This is a vault’s primary key used for signing transactions. It can be either a passkey or a hardware key from the Chia Signer app.

Expand Down

0 comments on commit 62b5116

Please sign in to comment.