📢 #Gate Square Writing Contest Phase 3# is officially kicks off!
🎮 This round focuses on: Yooldo Games (ESPORTS)
✍️ Share your unique insights and join promotional interactions. To be eligible for any reward, you must also participate in Gate’s Phase 286 Launchpool, CandyDrop, or Alpha activities!
💡 Content creation + airdrop participation = double points. You could be the grand prize winner!
💰Total prize pool: 4,464 $ESPORTS
🏆 First Prize (1 winner): 964 tokens
🥈 Second Prize (5 winners): 400 tokens each
🥉 Third Prize (10 winners): 150 tokens each
🚀 How to participate:
1️⃣ Publish an
A New Approach to MPC Wallet Management: Reflections and Improvements After the Multichain Incident
The Correct Management Method of MPC Wallets: Learning from the Multichain Incident
Recently, the Multichain project has encountered significant setbacks, with its CEO going missing, leading to the revocation of access keys for the MPC node servers. This incident has exposed many issues in the management of MPC Wallets and provided us with valuable lessons.
Reflection on Multichain Events
Although Multichain uses MPC technology to manage the treasury, its management method is essentially equivalent to a single entity controlling all assets. All node servers operate under the CEO's personal cloud service account, and this highly centralized management approach contradicts the decentralized intention of MPC technology.
This event reveals a key issue: simply adopting decentralized technology is not sufficient to ensure true decentralization. To fully leverage the advantages of MPC technology, a unified decentralization of both technical applications and management models is required.
Key Points for Effectively Utilizing MPC Technology Characteristics
The MPC solution of Multichain is essentially a "black box", lacking transparency and verifiability. To address this issue, it is crucial to introduce credible third-party MPC service providers. This can eliminate the "black box" effect and provide necessary information verification for stakeholders.
Ensuring the decentralization of servers, access permissions, and geographical locations is key. One viable solution is to adopt a multi-signature mechanism, such as a 3-3 multi-signature, supplemented by high-strength encryption and a trusted execution environment. At the same time, implement a multi-level private key derivation design to meet the business needs at different levels. In addition, adopting measures such as online remote multi-active distributed storage and multi-level offline cold storage backups can minimize single-point risks.
Considering the irresistible factors of the physical world, it is essential to design the "SOS mode" as a last line of defense. This mode can be activated under specific conditions to achieve emergency asset transfer or disposal. To prevent abuse, restrictions such as a delay in effectiveness and an asset lock-up period can be set.
Conclusion
The Multichain incident has sounded the alarm for the entire industry. It reminds us that merely adopting advanced technologies is not enough; what is more important is how to properly manage and apply these technologies. By enhancing transparency, strictly enforcing decentralization principles, and being prepared for extreme situations, we can better leverage the advantages of MPC technology to provide users with safer and more reliable asset management services.