What “Zero-Trust” Means
Your signing keys never exist in complete form. They’re generated using distributed key generation (DKG) across the Ika network:- Your share - Encrypted with your passcode, stored in the Ika network
- Network share - Held by Ika validators
What Umi Never Has
- Your complete private key (it never exists in complete form)
- Your passcode (only you know it)
- The ability to sign without your approval
- Access to move your funds unilaterally
What Umi Does Have
- Your encrypted key share (but can’t decrypt it without your passcode)
- Your public addresses (these are public by design)
- Your transaction history (for display in the app)
What the Ika Network Never Has
- Your complete private key
- Your passcode
- Your encrypted key share’s decryption key
- The ability to sign without your participation
The Security Model
For someone to steal your funds, they would need:- Your passcode (to decrypt your key share)
- Access to the Ika network’s share (held by distributed validators)
- To bypass your Umi Signer policies
- To compromise all of these at the same time
- Centralized exchanges - One company holds everything
- Traditional wallets - One seed phrase controls everything
- Hardware wallets - One device holds everything
Multi-Layer Security
Layer 1: Distributed Key Generation
Your keys are generated using DKG across the Ika network. No single party ever has the complete key.Layer 2: Umi Signer Policies
Before any signature is produced, your on-chain Umi Signer enforces:- Spending limits (per transaction, daily, monthly)
- Address whitelists and blocklists
- Timelock delays between signatures
- Quota-based rate limiting
- Two-factor authentication requirements
Layer 3: TEE Validation
For spending-related transactions, a Trusted Execution Environment:- Parses the actual transaction bytes
- Extracts recipient and USD value
- Validates against your configured limits
- Signs an attestation that the on-chain contract verifies
Layer 4: Agent Isolation
If you use AI agents:- Agents have their own keypairs (separate from your dWallet)
- Agents must be whitelisted in your Umi Signer
- All agent transactions go through policy enforcement
- Agents cannot modify their own permissions
Gas Accounts and Treasury
Umi maintains gas accounts to abstract away the complexity of holding native tokens on each chain.How Gas Accounts Work
- Auto-generated keypairs: Umi generates secure keypairs for each supported chain
- Encrypted storage: Private keys are encrypted with AES-256-GCM
- Balance monitoring: Continuous monitoring of gas account balances
- Auto-refill: When balances drop below thresholds, accounts are refilled from a USDC treasury
Treasury Security
- USDC treasury held on Solana
- Separate encrypted keypair
- Cross-chain refills via RocketX bridge
- Auditable refill history
Your Gas Credits
When you deposit to your gas credit balance:- Your deposit is converted to USD-denominated credits
- When you transact, Umi pays gas from its chain-specific accounts
- Your credit balance is debited the USD equivalent
- You never need to hold gas tokens yourself
Protecting Your Account
Use a Strong Passcode
Your passcode encrypts your key share. Make it at least 12 characters with a mix of letters, numbers, and symbols.Protect Your Login
Your Google/Apple/Facebook account is how you access Umi. Use strong passwords and 2FA on those accounts.Configure Policies
Set up spending limits and timelocks in your Umi Signer. Even if something goes wrong, the damage is limited.Monitor Activity
Review your transaction history and agent activity regularly. Set up notifications for large transactions.Verify Transactions
Always check transaction details before confirming. Make sure the destination and amount are correct.Be Careful with DApp Connections
Only connect to DApps you trust. Review what permissions they’re requesting.If Something Goes Wrong
Lost Your Passcode?
Your passcode encrypts your key share. Without it, you can’t sign transactions. Umi cannot recover your passcode. This is a security feature - if we could recover it, so could an attacker. If you have a beneficiary configured, they can access the wallet after your inactivity period.Lost Access to Your Login?
Recover your Google/Apple/Facebook account through their normal recovery process. Your Umi account is linked to that identity.Suspicious Activity?
- Pause any active agents immediately
- Review recent transactions
- Check your Umi Signer policies
- Contact support for investigation
Zero-Trust Wallet Mode
For maximum security, you can enable zero-trust wallet mode:- Requires passcode for every sensitive operation
- Additional encryption layer on signing requests
- Recommended for large balances
TEE Technical Details
Umi uses AWS Nitro Enclaves for Trusted Execution Environment validation:Platform Configuration Registers (PCRs)
The TEE’s code is verified through PCRs:- PCR0: Enclave image hash
- PCR1: Linux kernel hash
- PCR2: Application hash
Attestation Flow
- TEE receives raw transaction bytes
- Parses transaction (supports EVM, Solana, Sui, Bitcoin, etc.)
- Extracts recipient address and amount
- Fetches USD value from price oracles
- Validates against user’s policy configuration
- Signs attestation with TEE’s Ed25519 key
- On-chain contract verifies signature against registered enclave
Security Properties
- Attestations expire after 5 minutes (no replay attacks)
- TEE code is publicly verifiable
- Enclave key never leaves the secure environment
- Real transaction values, not user-provided claims
Audits and Transparency
Smart Contracts
Umi’s smart contracts on Sui are:- Open source and verifiable on-chain
- Built on Ika’s audited cryptographic protocols
Security Reviews
The core signing technology has been reviewed by security researchers. We’re committed to regular security assessments.Bug Bounty
If you discover a security vulnerability, please report it responsibly. Contact security@umi.app.Summary
Umi’s security comes from multiple independent layers:- No complete keys - Keys are split and never combined
- Policy enforcement - Rules execute on-chain, trustlessly
- TEE validation - Real transaction values verified in secure hardware
- User control - You set the rules, you control the caps

