{"id":11,"date":"2019-11-11T10:46:34","date_gmt":"2019-11-11T10:46:34","guid":{"rendered":"https:\/\/arkudasolutions.com\/blog\/?p=11"},"modified":"2019-11-12T14:56:07","modified_gmt":"2019-11-12T14:56:07","slug":"multi-signature","status":"publish","type":"post","link":"https:\/\/arkudasolutions.com\/blog\/2019\/11\/11\/multi-signature\/","title":{"rendered":"Multi-signature"},"content":{"rendered":"\n<p>Hello, everyone! In this post, we would like to cover the problem of authority and how it affects the decision-making process. We would also talk about how multi-signature can address those issues and discuss a few real-life examples.&nbsp;<br><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/arkudasolutions.com\/blog\/wp-content\/uploads\/2019\/11\/photo-1459347268516-3ed71100e718-1024x683.png\" alt=\"\" class=\"wp-image-12\" srcset=\"https:\/\/arkudasolutions.com\/blog\/wp-content\/uploads\/2019\/11\/photo-1459347268516-3ed71100e718-1024x683.png 1024w, https:\/\/arkudasolutions.com\/blog\/wp-content\/uploads\/2019\/11\/photo-1459347268516-3ed71100e718-300x200.png 300w, https:\/\/arkudasolutions.com\/blog\/wp-content\/uploads\/2019\/11\/photo-1459347268516-3ed71100e718-768x512.png 768w, https:\/\/arkudasolutions.com\/blog\/wp-content\/uploads\/2019\/11\/photo-1459347268516-3ed71100e718.png 1350w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Quite often, the same operation would have to be confirmed by different individuals, especially when it comes to finances. There are different reasons for confirming one operation for several times. Sometimes it is simply required by certain policies, sometimes it is just an extra measure of protecting oneself from unauthorized access. No matter the intention, it is simply the reality of many fields: worrying, theft, and unexpected sign-ins. Luckily, there are blockchain-based solutions.&nbsp;<br><\/p>\n\n\n\n<p>People who work with wallets, which require only one password (private key), may find themselves in plenty of unpleasant scenarios. For example, if a private key is lost, then the person wouldn\u2019t be able to access their wallet anymore. If a key is compromised, the thief could transfer all the assets in minutes and it is nearly impossible to track and get them back. If a mistake occurs, such as transferring the assets to a wrong account, it can\u2019t be reversed. The assets are lost. Ouch.<br><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Anyways, there are a lot of \u201cifs\u201d and enough terrifying possibilities. However, with blockchain-based solutions, all of these risks can be resolved and avoided by using multi-signature. The name speaks for itself: you access your account by entering several signatures (private keys) for certain operations. For instance, in <a href=\"https:\/\/www.stellar.org\/\">Stellar<\/a> blockchain, each account requires from one to several signatures for the authorization. Each signature has its own value, but to gain access to an account, you\u2019ll need a certain \u201cweight,\u201d so-called \u201cchangeable thresholds.\u201d The thresholds vary for different operations, including transaction processing, allowing trust, account merging, changing account settings, etc. Not only does this approach provide flexibility for different types of business implementation, but it also mitigates risks of losing assets due to errors or the compromisation of private keys. Signing in could be performed by hardware wallets like <a href=\"https:\/\/www.ledger.com\/\">Ledger<\/a> or <a href=\"https:\/\/trezor.io\/\">Trezor<\/a>, so the private key is much less likely to be leaked in comparison to the password entered by the keyboard.&nbsp;<br><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Let\u2019s consider three real-life cases in which multisig is an optimal approach. The first example is a small family business. Each member of the family would have a private key but transferring assets from the wallet would require at least two of them. This way the parents are sure that their son can\u2019t make any unconfirmed purchases like a Kawasaki motorcycle to \u201coptimize the delivery\u201d.<br><\/p>\n\n\n\n<p>Another good example is financial or procurement systems, in which the payment must be authorized by several individuals because of a certain internal policy or regulation. In this case, instead of manually doing everything good-old way\u2013on paper\u2013all operations could be easily implemented on the top of the blockchain. The newly implemented pipeline will automatize and ease the work, also ensuring the security of the operation. <br><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Finally, let\u2019s consider a case in which certain crypto-assets need to be protected. Two company executives have the sign rights, each of whom would have one key plus an extra back-up key. Three keys total. So, if a key is lost or compromised, the company does not lose access to the account and can easily replace the key. If an important operation is about to take place, the system would require two signs. <\/p>\n\n\n\n<p>What do you think? We would love to hear your ideas in the comments!&nbsp;<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hello, everyone! In this post, we would like to cover the problem of authority and how it affects the decision-making process. We would also talk about how multi-signature can address those issues and discuss a few real-life examples.&nbsp; Quite often, the same operation would have to be confirmed by different individuals, especially when it comes [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[3,9,6,7,8,10],"class_list":["post-11","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-blockchain","tag-ledger-wallet","tag-multi-signature","tag-multisig","tag-stellar-blockchain","tag-trezor-wallet"],"_links":{"self":[{"href":"https:\/\/arkudasolutions.com\/blog\/wp-json\/wp\/v2\/posts\/11","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/arkudasolutions.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/arkudasolutions.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/arkudasolutions.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/arkudasolutions.com\/blog\/wp-json\/wp\/v2\/comments?post=11"}],"version-history":[{"count":3,"href":"https:\/\/arkudasolutions.com\/blog\/wp-json\/wp\/v2\/posts\/11\/revisions"}],"predecessor-version":[{"id":15,"href":"https:\/\/arkudasolutions.com\/blog\/wp-json\/wp\/v2\/posts\/11\/revisions\/15"}],"wp:attachment":[{"href":"https:\/\/arkudasolutions.com\/blog\/wp-json\/wp\/v2\/media?parent=11"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/arkudasolutions.com\/blog\/wp-json\/wp\/v2\/categories?post=11"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/arkudasolutions.com\/blog\/wp-json\/wp\/v2\/tags?post=11"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}