The wait is over. $LOCK is live!
LogoLogo
Back to Gridlock
  • 👋Welcome
  • ⚔️Guardians
    • ⚔️All About Guardians
      • Why can't a Guardian steal my crypto?
      • Can a hacker combine the devices in my network?
      • Why does Gridlock have 2 parts of my key?
      • Why not use a seed phrase for recovery?
      • Partner Guardians
  • 💎Gridlock Crypto Wallet
    • Getting Started
    • Guardians
      • How they work
      • Social Recovery
        • Device Migration
        • Guardian Replacement
        • Password Reset
    • Transactions
      • Purchasing
      • Sending and Receiving
    • NFTs
      • Gridlock Foundation Coin
        • How to claim the Gridlock Foundation Coin
    • Gridlock vs Cold Storage
  • 👑Gridlock Pro
    • Going Beyond Secure
    • Features
      • Advanced Monitoring
      • More Guardians
      • Access to Partner Guardians
      • Priority Support
  • 💫The tech
    • Design Principles
      • Simple
      • Safe
      • Non-custodial
    • Multi-Party Computation
    • Distributed Key Generation
    • Threshold Signatures
  • LOCK
    • Learn about LOCK
    • Earn some LOCK
    • General LOCK FAQ
  • 🧞‍♂️FAQs
    • General FAQs
    • Transaction FAQs
  • 🖥️Developer Docs
    • SDK / CLI Documentation
    • Gridlock Demo Setup
Powered by GitBook
On this page

Was this helpful?

  1. The tech

Design Principles

Gridlock delivers a product that is:

  • Simple

  • Secure

  • Sovereign

These three principles define Gridlock's brand values and development mindset. A Gridlock network is built with your ease of use and personal security in mind. Read on to learn the details of how we encompass these qualities in everything we do.

Last updated 26 days ago

Was this helpful?

💫