Are you an LLM? Read llms.txt for a summary of the docs, or llms-full.txt for the full context.
Self-Custody & Compliance – 1auth
Skip to content

Self-Custody & Compliance

Passkeys enable true self-custody of crypto assets, which has significant implications for regulatory compliance.

Self-Custody Tests

1auth's architecture passes the key tests that distinguish a self-custodial wallet from a custodial service:

Test1auth
Provider cannot access private keysKeys are generated and stored exclusively in user device hardware (Secure Enclave, TPM). 1auth never sees key material.
Provider cannot sign transactionsAll signing happens on-device via WebAuthn. 1auth has no technical ability to produce valid signatures.
Provider cannot censor or block users1auth cannot prevent a user from signing or submitting transactions. Users can also interact with their smart account directly onchain.
Provider cannot freeze or seize fundsAssets are held in user-owned smart contract accounts. 1auth has no admin keys or backdoors.
User can recover access independentlyPasskeys sync across devices via platform providers (iCloud Keychain, Google Password Manager). Users can also add backup passkeys or recovery modules to their smart account.
Test1auth
The "Reconstruction" Test: Provider cannot access or reconstruct the private keysKeys are generated and stored exclusively in user device hardware (Secure Enclave, TPM). 1auth never sees the key material.
The "Seizure" Test: Provider cannot sign transactions or withdraw fundsAll signing happens on-device via WebAuthn. 1auth has no technical ability to produce valid signatures.
The "Censorship" Test: Provider cannot block users1auth cannot prevent a user from signing or submitting transactions. Users can also interact with their smart account directly onchain.
The "Independency" Test: User can recover access independentlyPasskeys sync across devices via platform providers (iCloud Keychain, Google Password Manager). 1auth also provides a recovery module with a recovery path that is independent of 1auth systems.

Portability

A common concern with any wallet provider: what happens if the service shuts down?

  • Passkeys are synced by platform providers - iCloud Keychain, Google Password Manager, and password managers like 1Password store and sync passkeys independently of 1auth.
  • Smart accounts are onchain - User accounts exist as smart contracts on public blockchains. They continue to function regardless of whether 1auth's service is running.
  • Direct onchain interaction - Users can interact with their smart account directly through any EVM-compatible tool (e.g., Etherscan, Cast) using their passkey-derived signature.
  • Module-based recovery - Users can install recovery modules (social recovery, backup keys) on their smart account for additional portability.

Regulatory Framework Alignment

This self-custodial design aligns with major regulatory frameworks:

European Union (MiCA)
  • Custody requires safekeeping crypto-assets or means of access (like private keys)
  • 1auth doesn't hold assets or keys—users retain exclusive control
  • Meets requirements for non-custodial service classification
United States (SEC/FinCEN)
  • Guidance distinguishes "hosted" (custodial) from "unhosted" (non-custodial) wallets
  • Unhosted wallets: users independently control keys and transact directly
  • 1auth's architecture aligns with unhosted wallet classification

What This Means for You

StakeholderBenefit
DevelopersReduced compliance burden when adding crypto functionality to your app
UsersFull ownership of assets with no third-party risk
EnterprisesArchitecture compatible with self-custodial positioning in regulated markets

Passkeys vs Traditional Approaches

Seed PhrasesBrowser ExtensionsCustodialMPCTEE (server)Passkeys (1auth)
Key on User DeviceYesYesNoNoNoYes
Hardware-ProtectedNoNoNoDependsDependsYes
Self-CustodyYesYesNoNoNoYes
Provider Can't SignYesYesNoNoNoYes
Provider Can't CensorYesYesNoDependsNoYes
RecoverableNoNoYesYesYesYes
Great UXNoNoYesYesYesYes