✨ Amazing News ✨ Dfns Teams Up with Tokeny to Empower Institutional Tokenization. Read more

Developer Fluency

The ultimate dev tool to create millions of wallets

Smoothly deploy your crypto custody infrastructure in no time and get streamlined features and security upgrades—instantly. We provide turnkey access to cloud-native, elastic development environments that help you roll out compliance-friendly products for DeFi and TradFi.

create_asset_account.js
  var axios = require ('axios');
  var data = JSON.stringify({
    "assetSymbol": "ETH",
    "groupSize": 7,
    "groupThreshold": 3
  });
  
  var config = {
   method: 'post',
   url: 'https://api.dfns.io/assets/asset-accounts',
   headers: {
      'Authorization': 'Bearer ACCESS_TOKEN',
      'Content-Type': 'application/json'
   },
   data : data
  };
  
  axios(config)
  .then(function (response) { console.log(JSON.stringify(response.data)) })
  .catch(function (error) { console.log(error) });
  

Switch on banking superpowers for Web3.

Generate configurable wallets at scale, manage segregated accounts, sign transactions at high-speed, set up business rules, and monitor balance in-real-time via API.

signing_box:_sign.py
  import requests
  import json
  
  url = "https://api.dfns.io/mpc/public-keys"
  
  payload = json.dumps({
    "assetAccountId": "",
    "externalId": "test id",
    "groupSize": 5,
    "groupThreshold": 3,
    "isEddsa": False,
    "tags": []
  })
  headers = {
    'Authorization': 'Bearer ACCESS_TOKEN',
    'Content-Type': 'application/json'
  }
  
  response = requests.request("POST", url, headers=headers, data=payload)
  

Build universal, multi-chain apps by design.

Get unlimited access to the trades and opportunities on DeFi apps through low-level message and hash signing on Layer 1 and 2 blockchains as well as smart contracts.

create_policy_rule.py
  import requests
  import json
  
  url = "https://api.dfns.io/policies/policy-rules/"
  
  payload = json.dumps({
    "description": Siphoning,
    "name": "poliy rule no.1",
    "configuration": {
      "kind": "Siphoning",
      "maxTxCount": 10,
      "intervalInMinutes": 60
    }
  })
  headers = {
    'Authorization': 'Bearer ACCESS_TOKEN',
    'Content-Type': 'application/json'
  }
  
  response = requests.request("POST", url, headers=headers, data=payload)
  

Grow with blameless regulatory alignement.

Set up rules and approval policies for employees and partners, by limiting amounts, compounded payment frequency, admin rights of each wallet, and much more.

Maximum Security

Crypto needs defense in-depth, not DIY

Our decentralized custody network is designed to remove all kinds of human intermediation that put crypto at risk. Leveraging cutting-edge cryptography and networking, our system disperses the single point of failure of the wallet and minimizes conflicts of interest to absurdly low odds.

Requesting wallet
Req-2st*ngr-wall7
Xeq-2r3*zgr-wa/*7
Xhy-2r3*ztr-a/*z7
Account Created
Calculating Gx
C4lcu1atin8_Gx
C4*cu1a7in8_=x
<4*c/147iK8_=x
Wallet created
W4ll*7_cr3a/e:
W4lX*8_cR3vOe:
M4ll*7_Gr3a/e:.V
Washington
Success
Jaipur
Success
Berlin
Success
Tokyo
Success
5y=c-*6E_C0%ltV
Sy=c._*60mplte
Sy0c.FX6omplte
Sync. Complete
53kmet_KhoPrV
S3cmet_KhxPeV
Secret_KhaPes
Secret shares

No need to save what doesn't exist.

Multi-party computation or MPC — combined with zero-knowledge proofs, proactive secret sharing and other primitives — enables systemic keylessness. Instead of generating the key, our peer-to-peer network issues secret shares that can sign transactions as one while ensuring that they remain segregated throughout the entire wallet lifecycle.

Calculating Xi & Yi on ECDSA
]alculating Xi _ Yi on E<DSA
Zalc+lating 2i H Yi on u:>Sn
s%lc+l&bin7 M; / Yi $n 3<,S&
:Wq4+ù&b9!s ^i / Yi 0_ wZ1On
Calculating signature R on X1
%alculating si4nature R on X1
oalcu$Mting si4na)ure 2 on X1
1alc<-btinT 0sifna&ure * An x:
éZù3¨S<ApB0 s^&jZ=a+Ao 6 #V p+
Issuing signature R +/ tX +/ PrivateKey
$ssuing Zignature R +/ tX +/ PrivateKey
)ss8ing :ignatu0w R +/ tX +/ 3rivateK-y
*Ax>ing !)Hnat?ù6 3 +/ Ux +/ :m^vateK+y
3q/$Z7: Rç&Q2i0:< s ^d j= 7) 0aVx7*$A:k
Pairing to Xi
$airing to Xi
Gai+ing t* =i
?a&ùi/g 5: qi
-N<+RhL }* u(

We make the key disappear, voila!

By distributing the key generation among a network of independent signers (fully redundant, fault-tolerant Tier 3+/4 data centers) and harnessing built-in recovery capabilities provided by threshold signature, we offer full asset control and business continuity without offloading the responsibility of securing the keys like non-custodial solutions do.

MITM Intercepted
TLS 1.3 Upgrade Implemented
Social Engineering Attempt
Incident Alert Triggered
Insider Attack Suspected
DMZ Reduced by 90%

Never trust, always verify.

Every user, employee, device, application, workload, and data flow is treated as untrustable, both inside and outside Dfns' zero trust network. We continuously authenticate, authorize and validate before anything or anyone gets access to our systems, which allowing us to outstrip adversarial moves and outmaneuver bad actors.

On-Demand Integrations

1 new blockchain every 2 weeks, 1 new token every 4 hours.
Request any integration—from KYT to auth to exchanges and more.

Plug-and-Playful API

POST, GET, DELETE, and connect with other powerful endpoints.
Make the most of our multi-tenant, cross-functional wallet APIs.

Standard SaaS Pricing

No base points, no transactional fees or other unfair pricing plans.
Free trials, monthly payments, annual commitments. Period.

We support 1000+ INTEGRATIONS

Blockchains, Tokens, NFTs, Cryptocurrencies, and more.

Our clients

Their stories

“On top of using one of the safest technologies, Dfns is providing one of the easiest custody systems to integrate. The team has been super reactive in integrating our feedback and provided pragmatic solutions to our problems.”
“Dfns’ bank-grade custody infrastructure shows a dedication to security that sits at the heart of Polymesh’s own core values as an institutional-grade blockchain for regulated assets. It’s our pleasure to collaborate with Dfns to bring issuers and investors on Polymesh extra peace of mind.”
“We believe that securing private keys, and therefore custody of digital assets, is a strategic capability for the future of Financial Institutions. Having worked closely with Dfns and their team since their participation in the ABN AMRO X Techstars accelerator we are excited to be part of their future as well.”

Audited and validated

Yogosha
Pentest - Oct 21'
by
Yogosha
Status:
Done
Yogosha
Pentest - May 22'
by
Yogosha
Status:
Done
Kudelski Security
Code Audit - June 22'
by
Kudelski Security
Status:
Done
Deloitte
ISO 27001
by
Deloitte
Status:
Ongoing
Deloitte
SOC 2 Type 1/2
by
Deloitte
Status:
Done
Distrust
Pentest - Sept 22'
by
Distrust
Status:
Ongoing
Yogosha
Pentest - Oct 21'
by
Yogosha
Status:
Done
Yogosha
Pentest - May 22'
by
Yogosha
Status:
Done
Kudelski Security
Code Audit - June 22'
by
Kudelski Security
Status:
Done
Deloitte
ISO 27001
by
Deloitte
Status:
Ongoing
Deloitte
SOC 2 Type 1/2
by
Deloitte
Status:
Done
Distrust
Pentest - Sept 22'
by
Distrust
Status:
Ongoing
Learn more