Progress

/

August 26, 2024

Introducing zkLogin: Enhanced Security with Zero-Knowledge Proofs (ZKPs) in Portkey

Enjoy unprecedented levels of tamper-proof identity verification and account security

Blog Image

We’re excited to announce that Portkey has successfully integrated Zero-Knowledge Proofs (ZKPs), introducing a groundbreaking feature called zkLogin. This update ensures an unparalleled level of security and privacy, offering a tamper-proof identity verification process that keeps user information completely confidential.

What is zkLogin?

zkLogin is a new verification option for Portkey users, enhancing the way your account is protected. In Portkey, your account is safeguarded by a social recovery mechanism, where a guardian (like your email, Google account, Apple ID, or Telegram) and a verifier (usually a third-party provider) work together to validate your identity.

With zkLogin, if you use a Google account or Apple ID as your guardian, your login and recovery data can be validated without a third-party verifier, enhancing security and decentralisation. This means whether you’re creating a new account or adding a new guardian to an existing account, zkLogin ensures your privacy is maintained at the highest standard.

By choosing zkLogin, you are opting for the most secure way to protect your Portkey account. It offers a robust solution that keeps your information safe and ensures that no data is exposed during the verification process.

How to Use zkLogin?

You can embrace zkLogin by adding a new guardian to your existing account or creating a new account!

1. Add a new guardian:

Open Portkey and navigate to My -> Guardians -> the + button at the top right.

Select your guardian type (Google account or Apple ID). zkLogin will automatically be applied to ensure your data remains secure.

Please note that currently zkLogin is only available when you choose Google account or Apple ID guardians.

2. Create a new account:

If you’re currently logged in, you need to first log out of your account via My -> Wallet -> Exit Wallet.

Open Portkey, enter the “Sign up” page, and select Google or Apple as your sign-up option. zkLogin will be automatically assigned as your verifier, protecting your account from the start.

Experience the future of security with Portkey’s latest update! Try zkLogin today by adding a new guardian or creating a new account, and enjoy peace of mind knowing your data is in safe hands.

If you already have the latest version installed on your device, the above feature will be automatically updated in the Portkey App/extension with no need for manual operation. You can also choose to update manually by clicking the Update button in the pop-up window.

Users without Portkey can download the latest version via the links below:

If you encounter trouble with installation, please email the team at support@portkey.finance or get in touch via:

Discord: https://discord.gg/EUBq3rHQhr

Telegram: https://t.me/Portkey_Official_Group

Portkey values your opinions and wishes to hear from you so that we can continually improve our product. Hence, we would appreciate it if you could take just 2 mins for this questionnaire after you try the product: https://forms.gle/CqzdzCcKGE4fo3oe6.

Hope you enjoy Portkey and have the best Web3 experience with us!

𝕏 X | 🎮 Discord | 💬 Telegram | 🏠 Website | 💻 Youtube

Author Image
Portkey
WalletWhy It Stands OutSupported Assets
Coinbase- Publicly-listed on the Nasdaq stock exchange- Holds your assets in a 1:1 ratio and does not repurpose them200+ cryptocurrencies, including BTC, ETH, XRP, and SOL
OKX- Supports 300+ cryptocurrencies and NFTs across multiple networks- Available as a mobile or desktop app, and browser extensionBTC, ETH, XRP, SOL, and 300+ more cryptocurrencies, along with NFTs on Ethereum, Solana, BASE, and more
Crypto.com App- Rewarding if you hold and build a cryptocurrency portfolio over time- Nifty features like Crypto Earn and Recurring Buy help you grow your holding easilyMore than 350 cryptocurrencies, including BTC, ETH, XRP, and SOL
Trust Wallet- Very wide range of assets- Available as a mobile app and browser extensionOver 10 million cryptocurrencies and 600 million NFTs from Bitcoin, Ethereum, Solana, Cosmos, and more
MetaMask- Can be used to complement your main Web3 wallet- Perfect for ownership of Ethereum-based tokens and NFTsAny asset on the Ethereum blockchain
Exodus- Over 100,000 cryptocurrencies supported- Buy any of them within the Exodus walletMore than 100,000 cryptocurrencies and NFTs across 16 blockchains
Ledger Stax- 5,500+ cryptocurrencies and NFTs supported- Certified Secure Element chip to shield it from online attacks5,500+ cryptocurrencies and NFTs
Trezor Safe 5- A compact device at 23g with a 1.54-inch touchscreen- Supports over 1,000 cryptocurrencies, and has a CC EAL6+-certified chipOver 1,000 cryptocurrencies, including BTC, ETH, XRP, and SOL
SafePal S1 Pro- Slim and sleek, with a 1.3-inch colour screen to show your holdings- Can be paired with the SafePal Wallet app and browser extension to grow your portfolio30,000 cryptocurrencies and more across 100+ blockchains
ZKPsMultisig WalletsTEE
StrengthsZKPs provide wallet owners with security and privacy at one goMultisig wallets are hassle-free and secure; easy to implement for any group or organisationTEEs allow Web3 wallets to achieve a similar level of security as hardware wallets
WeaknessesTransacting parties need to interact multiple times. It’s not ideal for non-real-time applications.Transaction costs are higher due to the multiple signatures – and gas fees – needed. Transaction speeds are lower too.Cannot be easily implemented for software-based Web3 wallets as it is operating system-dependent
Wallet TypeHardware WalletBrowser ExtensionMobile App Wallet
Pros- Offers the best security for Web3 digital assets- Many brands and models to choose from- You can conveniently add it to your web browser- It doesn’t take up much storage space on your PC- You can access your assets from anywhere- You can easily transfer assets between apps
Cons- You risk losing your assets when you lose the device- The cost can be prohibitive for some- Susceptible to security breaches if your browser is compromised- Functionality may be limited for some- Vulnerable to similar security breaches as browser extension wallets- You also bear the same risk of losing your assets if you lose your mobile device
Web2 PhishingWeb3 Phishing
MethodPurely reliant on offline or Web2 platforms. For example, phone calls, SMSes, publishing fake websites, etc.Utilises a mix of Web2 and Web3 platforms. For example, hackers impersonating a key opinion leader or deploying malicious smart contracts.
PurposeTo steal cash, personal information, and sensitive data.To steal digital assets and sensitive data, and control Web3 projects.