A technology's widespread adoption occurs when the provided benefits significantly outweigh the associated costs for the typical user. Decentralised Byzantine Fault Tolerant blockchains are widely considered secure and have matured to the point where modern protocols offer latency and throughput that match or even surpass those of the traditional financial system. Still, the technology struggles to find its way into the real world to serve everyday applications, with, we believe, the missing piece being the provision of cryptographic security in a practical way.
The conventional need of writing down 12 or 24 words to tuck away somewhere safe and never to lose track of is a considerable responsibility on the individual, considering there exists no other means of account recovery in case the original copy of the key gets lost. By allowing for account backup online without any single point of failure, Heim's dual-key and dual-device setup eliminates the need for written down mnemonic seed phrases.
Many excellent teams are building Turing-complete, fully decentralised world-computers, and we’re not here to compete—just to provide them and their users with a robust security interface.
The admin account provides the user with a dual-key self-custody account to configure permitted actions for the worker account and to transact on supported chains using the provided methods for dual-key signature generation.
With Heim’s layered security, you configure the permitted actions of your worker using your phone and a second device. Once configured, your worker acts with dual-key security, all while you leave the second device at home.
When provided with a request from your worker, the protocol serves it according to your permitted actions. Unfortunately for the guy you met on your way home from a night out, it means you cannot send him all of your funds.
Authorising specific recipients limits an adversary’s ability to steal from your worker account, and requiring the recipient of a transaction from your worker account to actively participate prevents the actor from rerouting your funds to an authorised address. If you, for example, spot a suspicious transaction to your local shop, chances are it happened in person—making it possible for the police to track down the perpetrator.