Ruby One V2
  • Ruby One V2 - Your Complete Ruby One Wallet Guide
  • General Introduction
    • Vision of Ruby One
    • What is Ruby One V2?
    • What is MPC technology?
    • Is MPC technology secure?
    • What are the benefits of MPC technology?
  • Why Use Ruby One
    • High-Security Wallet Access Through MPC
    • Contract Accounts for Secure and User-Friendly Blockchain Interaction
    • Third-Party DApp Integration with the Ruby DApp Bridge
    • Bridging the Web2-Web3 Gap
  • Tech Introduction
    • MPC-Secret Sharing
    • MPC-Threshold Signature Scheme
    • Social Recovery - DKIM
    • Contract Account Dynamic Upgrade
    • DApp Bridge
    • Ruby One V2 Upgrade Log
  • How to Use Ruby One V2
    • Launch App
    • Sign Up
    • Login Via Google
    • Login Via Email
    • Set Local Password
    • Backup Key Fragments
    • Three Test Networks
    • Send & Receive Crypto
    • Social Recovery Your Account
    • Sign Out & Clear Data
  • Term of Use
    • Welcome to Ruby Protocol
    • About the Website
    • Intellectual Property
    • Acceptable Use of the Website
    • Wallet Address, Private Key, and Backup Capabilities
    • Accuracy of Information Provided by User
    • Your Use of Ruby’s Services
    • Privacy Policies
    • Disclosure of Information
    • Changes and Availability
    • Contacting us via the Website
    • Age Restriction and Eligibility
    • Disclaimer of Warranty
    • Limitation of Liability
    • Changes to the Terms
    • Contact Us
  • Ruby One - MPC Wallet
Powered by GitBook
On this page
  1. General Introduction

Is MPC technology secure?

Granted, the term "secure" can be subjective, but we believe the solutions powered by MPC technology are extremely secure.

The key benefit of MPC technology is that it eliminates a single point of failure, which means that even if a malicious actor were to break into a single MPC node, they would have no way of knowing the entire targeted dataset.

This is also the philosophy adopted by the Bitcoin community. To hack the Bitcoin network, one must have the skills to organize a coup against the network, which includes hundreds of thousands of computers owned by an equally large, distributed number of people.

Similarly, in order to gain complete control of an MPC-protected wallet, they would theoretically need to launch a simultaneous attack on all parties who own Shares. For example, if there are ten nodes and the threshold for signing a transaction is five, attackers would need to break into six of them and steal the key shares. This is complicated by proactive security measures such as key rotation, which automatically moves sensitive private key material between nodes.

PreviousWhat is MPC technology?NextWhat are the benefits of MPC technology?

Last updated 1 year ago