Multi-signature crypto treasury with m-of-n threshold security (minimum 2). No hardware wallets. No seed phrases to lose. Just your team's mobile devices.
Everything you need to manage your organization's crypto treasury securely and efficiently
Your team's iPhones and Android devices become secure signing keys using Secure Enclave and hardware-backed keystores. No external devices needed.
Distribute key shares across multiple devices. Configure your threshold (minimum 2 signatures required). If devices are lost, you're still secure. No single point of failure.
Built-in approval chains for payment requests. Initiators submit, approvers review, signers execute. Full audit trail included.
Track USDC, USDT, EURC, and ETH across Solana, Base, and Ethereum. Live balance updates and transaction history.
Signers receive instant mobile alerts when transactions need approval. Review details and sign with Face ID or fingerprint.
Every action is logged: who initiated, who approved, who signed, when, and from where. Export for compliance or accounting.
No hardware wallets. No seed phrases. Just your team's mobile devices.
Sign up and invite your team members. Configure your signing threshold (m-of-n) based on your security requirements.
Team members scan a QR code on their phones. In 60 seconds, a threshold wallet is created using MPC. Each device holds one encrypted key share.
Submit payment requests, get approvals, and release funds. Required signers approve with biometric authentication. Transactions execute on-chain instantly.
Your private keys never exist in one place. They're generated and stored using threshold cryptography across multiple mobile devices with configurable m-of-n signing (minimum 2 required).
Keys are split using threshold signatures (TSS). Configure your threshold to ensure redundancy—losing devices below the threshold won't compromise your funds.
iOS Secure Enclave and Android StrongBox protect key shares. Keys never leave the hardware security module.
Every signature requires Face ID, Touch ID, or fingerprint authentication. No passwords to phish.
Our backend only routes encrypted messages. It has zero knowledge of your private keys or shares.
M-of-N threshold signing (min. 2).
No device holds the full key.
Threshold Security
Setup Time
Signature Threshold
Launch Year
Be the first to know when SecondSet launches. Get early access and exclusive updates.
Or reach out to us on X @secondsetcrypto