Coming soon

Non-custodial digital asset storage made simple

Securely manage your digital assets in one solution, eliminating common banking pain points like traditional business hours and long settlement times.

custody-hero

Intuitive and secure digital asset storage

key-apple

Enable the use of private keys, while operating in a secure execution environment

user-apple

Designate user roles to achieve operational efficiency

check-apple

Enhance approval workflows for transaction integrity

docs-apple

Offer visibility for compliance and leadership teams with transaction logs

staking-vault

Manage digital assets with ease

Transactions are no longer limited to banking hours, and one-click approvals can happen from anywhere in the world. Use Custody to streamline your treasury operations with our simple to use, out-of-the-box solution.

Transact on-chain with enterprise-grade security

Fortify your treasury operations through our unique shared risk and responsibility model, and MPC technology. Custody eliminates single points of failure, lets you set limits and specific approval policies per transaction threshold, and helps you track your funds at all times.

Talk to our team

Complete the form to get in touch with a member of our team, and stay up-to-date with the latest announcements as we introduce Custody to all Circle Account users.

FAQ

Multi-Party Computation (MPC) technology enables multiple parties – each holding their own private data – to evaluate a computation without ever revealing any of the private data held by each party, while preserving privacy and accuracy.

MPC does away with a single private key, and thus this single point of failure. Further, it allows for multi-approver and multi-level threshold approval schemes, removing many common internal and external attack vectors.

The private key material resides in an internet-disconnected zone. Circle provides the infrastructure to store the sharded private key- though the access token is required to utilize the private key.

No single entity has access to the private key. All key shards must be activated to access the private key.

No, while Circle provides the storage for the key, access to the private key requires the access token - which Circle does not have. Thus, Circle cannot utilize your private key.

Either an encrypted backup file & secret can be used to regain access. If the user loses the backup-file & secret, recovery of the wallet is not possible. However, in most cases, it should be possible to move the funds out of the wallet by an operator to a new wallet.