LOGO
Return to Ambisafe.com

Other documentation

Other documentation

How to report sensitive or confidential information to Ambisafe

Please submit the vulnerability details by email to [email protected] , PGP-encrypted by our key: -----BEGIN PGP PUBLIC KEY BLOCK----- Comment: GPGTools - https://gpgtools.org...

Avatar

By Andrii Zamovsky

updated 11 months ago

How to use two-factor authentication

What is a two-factor authentication? The two-factor authentication (2FA) is a security scheme that prevents someone who has your login and password information from accessing your account. It...

Avatar

By Andrii Zamovsky

updated 9 months ago

User Contracts diagram

See the following diagram: Important:  Your email backup contains the private key for Controller Address. In dashboard you will see Storage Contract address. You can also read   How User Contracts...

Avatar

By Andrii Zamovsky

updated 11 months ago

EToken URI scheme specification

Abstract This document describes an URI scheme for making EToken payments. It's heavily based on Bitcoin BIP-0021. Motivation The purpose of this URI scheme is to enable users to easily make...

Avatar

By Andrii Zamovsky

updated 11 months ago

Difference between cold storage and multi-sig storage

Cold storage Cold storage refers to storing a private key for a cryptocurrency wallet on a piece of paper in a physically secure location. Typically, the person who is in charge of the storage has...

Avatar

By Andrii Zamovsky

updated 11 months ago
Gist

We run on Gist

  • Return to ambisafe.com
  • LinkedIn
  • Twitter
  • Facebook

© 2010 - 2020 Ambisafe