Recovery Service;

Never lose the keys again

Key sharding ensures fast, secure recovery while keeping customers in full control of their assets

Request a Demo
Zero knowledge proof

Our Backup Center is a secure, encrypted cloud-based vault. Thanks to its strong encryption, only the user, with their unique credentials, can access the stored data—no one else, not even us.

Keys never outside the chip

The Backup Center's privacy and encryption, combined with our advanced cryptographic techniques, ensure that private keys are never stored anywhere except within the chip's top-notch security.

Enabling features

Although the recovery process is one of the most remarkable features enabled by the Backup Center, it also offers other capabilities, such as managing unlimited seed phrases and wallets.

Decentralized Recovery. Fast, Secure, Uninterrupted

01

Card Issuance

Card Issuance

Card Issuance

Get your eSigunus hardware card, then use the mobile app to scan and activate it for secure cold storage.

02

Card activation

Card activation

Card activation

The eSignus card is initialized simply by scanning it with the app for secure cold storage.

03

Secure Key Recovery

Secure Key Recovery

Secure Key Recovery

Download the information from the backup center to the card. The data will be transferred from the vault to the card.

04

Easy Key Restoration

Easy Key Restoration

Key Restoration

All keys in the card’s secure element can be restored, as multiseed support offers enhanced flexibility in key management.

05

Setup Complete

Setup Complete

Setup Complete

All keys and portfolios have been successfully restored and are securely stored in the card’s secure element, providing full access to funds.

Lost Hardware Wallet or Portfolio? These are the steps for Crypto Recovery

Step 01

Scan Card for Recovery Key

In the event of a lost card, a new one should be ordered. The replacement card will contain the personal recovery seed phrase. Using contactless technology, it retrieves the Recovery Key stored in the Backup Center. The EAL6+ chip on the card then processes both the Recovery Seed and the Recovery Key to regenerate all wallet private keys.

(*)If the hardware wallet card is not lost, the process remains the same without the need to request a duplicate.

Step 02

Select Portfolio for Multiseed

In the case of multiple portfolios (Multiseed option), it is possible to restore or activate only the necessary ones.

Step 03

Keys Secure in EAL6+ Chip

Follow the on-screen instructions, ensuring the card stays close throughout the process. Once the scan is complete, the Private Keys will be securely stored in the EAL6+ chip, remaining 100% offline andunbreakable.
(*)If the hardware wallet card is not lost, the process remains the same without the need to request a duplicate.

Step 04

Effortless Wallet Restoration

The wallets are restored automatically by storing the derivations and public keys of each currency in an encrypted format. When the wallets are restored on a new device, they reappear without needing to be manually recreated.

Step 05

Mantain the Recovery Porfolio backup

To recover your portfolio assets, you must have previously created a backup. This will restore the indexes and names of the derived wallets stored in your vault.
(*)If the hardware wallet card is not lost, the process remains the same without the need to request a duplicate.

Crypto Inheritance Solved

eSignus ensures the secure transfer of cryptocurrency assets to heirs by following these estate planning steps.

Full Control Anytime

Inheritance Planning

Future Security Preparation
Plan access to assets for heirs without compromising current security..
Designation of Heirs
Assign heirs without revealing sensitive information.
Backup Card Generation and Delivery
A coded backup card is created for heirs, activated only with proper authentication.
Backup Warranty

Asset Transfer Process

Initiate the process
Using the backup card heritage and user credentials, heirs can initiate the secure recovery through the white label digital wallet..
Authentication of rights
The combination of the backup card and credentials enables legitimate recovery of assets.
Access to assets
Once authenticated, heirs can manage and transfer assets.

FAQs. Find the Answers to your Questions

How secure is the eSignus wallet?

Our technology has been awarded twice by cybersecurity experts for its robust security features. Furthermore, industry leaders, such as Giesecke+Devrient, trust it. Our design also incorporates a comprehensive and innovative range of security measures to fully protect the keys and the assets management, ensuring the highest level of security in the cryptocurrency market.

What makes the eSignus Cold Wallet so remarkable?

Our hardware wallet stands out not only by including all the essential features typical of other cold wallets but also by offering innovative and unique functionalities that enhance user experience and security, such as:

  • Decentralized Recovery Process: Who hasn’t heard stories of people who bought Bitcoin at a fraction of its current value, only to realize years later that they lost their keys and the fortune they could have made by selling at market price? Our recovery process prevents this from happening, allowing users to recover their crypto just by ordering a new backup card whenever needed.
  • Multiseed: Before our cold wallet, if one had ten private keys, one would have needed ten devices to manage them with security. Nonetheless, our cold wallet manages an unlimited number of private keys and wallets, flipping the market at a very competitive price.
  • Crypto inheritance: Our twice-awarded technology allows users to pass on their inheritance securely without ever sharing their keys with heirs.
  • Easy of use: Our wallet allows users to sign transactions simply by tapping the card to a phone with NFC connectivity, providing a seamless and straightforward experience. This contrasts with the more cumbersome process of Ledgers wallets, the long-time market leader.
What’s a Cold Wallet?

A cold wallet is a physical device designed to store cryptocurrency private keys offline, protecting them and therefore, the associated funds from hackers. By keeping keys disconnected from the internet, cold wallets significantly reduce the risk of cyber-attacks. Some cold wallets, like ours, enable users to send, swap, sell, and buy cryptocurrencies directly, combining security with flexibility. This makes cold wallets an essential tool for anyone looking to safeguard their digital assets effectively.

Wealth Stored in Traditional Banks vs. Cryptocurrencies

The main difference between keeping money in a traditional bank and owning digital assets is that with the latter, the owner is responsible for the safety of their funds. Additionally, blockchain technology ensures that once a transaction is made, no one can reverse or modify it, not even if the money was stolen. Furthermore, if the keys get lost or stolen, so does the money.

Thus, crypto users need to take care of two main issues:

- Preventing Keys from Being Stolen by Hackers:
To mitigate this risk, the primary recommendation is to keep keys offline by storing them in a truly secured cold wallet. This keeps sensitive information out of reach from online attackers.

- Avoiding the Loss of Keys: We’ve all hidden something so well that we couldn’t find it again. In the crypto world, losing access to one's keys means losing one's assets permanently. This is why using a cold wallet like ours, with secure and accessible backup practices, is essential for managing digital assets safely.

Still have questions?

We are here to answer any questions you may have