Coming Soon

Enterprise Treasury
Secured by Your Team's Phones

Multi-signature crypto treasury with m-of-n threshold security (minimum 2). No hardware wallets. No seed phrases to lose. Just your team's mobile devices.

Bank-Grade Security
M-of-N Threshold Signing
Mobile-First
SecondSet Dashboard Preview

Built for Modern Finance Teams

Everything you need to manage your organization's crypto treasury securely and efficiently

Mobile Threshold Signing

Your team's iPhones and Android devices become secure signing keys using Secure Enclave and hardware-backed keystores. No external devices needed.

M-of-N Threshold Security

Distribute key shares across multiple devices. Configure your threshold (minimum 2 signatures required). If devices are lost, you're still secure. No single point of failure.

Approval Workflows

Built-in approval chains for payment requests. Initiators submit, approvers review, signers execute. Full audit trail included.

Real-Time Balances

Track USDC, USDT, EURC, and ETH across Solana, Base, and Ethereum. Live balance updates and transaction history.

Push Notifications

Signers receive instant mobile alerts when transactions need approval. Review details and sign with Face ID or fingerprint.

Complete Audit Logs

Every action is logged: who initiated, who approved, who signed, when, and from where. Export for compliance or accounting.

Get Started in Minutes

No hardware wallets. No seed phrases. Just your team's mobile devices.

1

Create Your Organization

Sign up and invite your team members. Configure your signing threshold (m-of-n) based on your security requirements.

2

Run Keygen Ceremony

Team members scan a QR code on their phones. In 60 seconds, a threshold wallet is created using MPC. Each device holds one encrypted key share.

3

Start Managing Treasury

Submit payment requests, get approvals, and release funds. Required signers approve with biometric authentication. Transactions execute on-chain instantly.

Enterprise-Grade Security Without the Complexity

Your private keys never exist in one place. They're generated and stored using threshold cryptography across multiple mobile devices with configurable m-of-n signing (minimum 2 required).

  • No Single Point of Failure

    Keys are split using threshold signatures (TSS). Configure your threshold to ensure redundancy—losing devices below the threshold won't compromise your funds.

  • Hardware-Backed Storage

    iOS Secure Enclave and Android StrongBox protect key shares. Keys never leave the hardware security module.

  • Biometric Protection

    Every signature requires Face ID, Touch ID, or fingerprint authentication. No passwords to phish.

  • Coordinator Never Sees Keys

    Our backend only routes encrypted messages. It has zero knowledge of your private keys or shares.

Key Share 1 Key Share 2 Key Share 3 🔐

M-of-N threshold signing (min. 2).
No device holds the full key.

M-of-N

Threshold Security

<60s

Setup Time

Min. 2

Signature Threshold

2026

Launch Year

Join the Waitlist

Be the first to know when SecondSet launches. Get early access and exclusive updates.

Or reach out to us on X @secondsetcrypto