In part 1 we discussed the dangers around securing wallets, and why it is important. In this post we'll look into the practical side: what you should do for better security, and where you should focus your efforts.
It is important to realize that in the real world, something always leaks. People get phished. Devices get compromised. Screenshots end up in cloud backups. Passwords get reused. If your system depends on a single secret, device or seed phrase, eventually that secret becomes someone else’s.
That’s why Strong Customer Authentication (SCA) is such a useful mental model. It’s built around proving the user is the rightful owner using multiple independent factors, commonly framed as something you have, something you know, something you are.
Here’s a practical approach you can adapt whether you’re building a wallet, an exchange, or a Web3 app that moves value:
That’s the should be the basis of a modern wallet security model: device possession + biometric/PIN + transaction clarity, with identity verification backing the risky edges (onboarding, recovery, re-enrollment).
Most teams obsess over login and forget the dangerous moment: when a user changes phones.
Attackers love recovery flows because they’re often the easiest path to “becoming” the user. The source text makes the key point clearly: if re-enrollment on a new device triggers robust identity verification, then even a stolen seed phrase doesn’t automatically grant control, and attackers hit a wall.
That’s what founders should aim for: a recovery experience users can complete, but where attackers can’t automate attacks.
When you combine these pieces, you get something that looks a lot like mobile banking, except it’s Web3.
The future flow can go something like this: the user verifies identity (eID/passport), keys are generated inside a secure enclave, a certificate ties identity to the wallet’s public key, and transactions require the presence/signature of that certificate. If the user restores on a new device, identity re-verification enables recovery, without making seed phrases the only lifeline.
This should be the goal: security, usability, and compliance at the same time, with the complexity pushed under the hood.
Unlock updates, insights, and exclusive content delivered to you.
Strong authentication isn’t just a checkbox, it’s leverage:
Crypto wallets promises ownership of assets. But ownership without safety doesn’t scale.
The good news is we don’t need to invent the answer from scratch. We can take what finance learned: SCA, device-based trust, strong recovery, and implement it in a way that feels like a modern consumer app. Interested in knowing more? Take a look at our other blog posts.