The wait is over. $LOCK is live!
LogoLogo
Back to Gridlock
  • 👋Welcome
  • ⚔️Guardians
    • ⚔️All About Guardians
      • Why can't a Guardian steal my crypto?
      • Can a hacker combine the devices in my network?
      • Why does Gridlock have 2 parts of my key?
      • Why not use a seed phrase for recovery?
      • Partner Guardians
  • 💎Gridlock Crypto Wallet
    • Getting Started
    • Guardians
      • How they work
      • Social Recovery
        • Device Migration
        • Guardian Replacement
        • Password Reset
    • Transactions
      • Purchasing
      • Sending and Receiving
    • NFTs
      • Gridlock Foundation Coin
        • How to claim the Gridlock Foundation Coin
    • Gridlock vs Cold Storage
  • 👑Gridlock Pro
    • Going Beyond Secure
    • Features
      • Advanced Monitoring
      • More Guardians
      • Access to Partner Guardians
      • Priority Support
  • 💫The tech
    • Design Principles
      • Simple
      • Safe
      • Non-custodial
    • Multi-Party Computation
    • Distributed Key Generation
    • Threshold Signatures
  • LOCK
    • Learn about LOCK
    • Earn some LOCK
    • General LOCK FAQ
  • 🧞‍♂️FAQs
    • General FAQs
    • Transaction FAQs
  • 🖥️Developer Docs
    • SDK / CLI Documentation
    • Gridlock Demo Setup
Powered by GitBook
On this page

Was this helpful?

  1. Guardians
  2. All About Guardians

Can a hacker combine the devices in my network?

Gridlock's design ensures that only the user's device can access their crypto, providing robust protection against potential hackers. Even if a hacker somehow managed to guess your account credentials, the security measures in place would limit their access to a 'Read Only' mode. This means they would be unable to perform any transactions or make unauthorized changes.

To successfully steal your crypto, a hacker would need to gain access to your device, your Guardian's devices, and other secure devices within your network. The distributed nature of Gridlock's security infrastructure makes it highly unlikely for all these devices to be compromised simultaneously.

Therefore your crypto assets remain secure as only your device has the capability to initiate transactions. The decentralized and protective nature of Gridlock's ecosystem ensures that your assets are well-guarded against potential theft.

Last updated 1 year ago

Was this helpful?

⚔️
⚔️