Keystone Wallet is a self-custodial hardware wallet that provides secure private key storage. It uses QR codes for air-gapped transaction signing.
Platforms: as a hardware wallet.
Walletbeat's database does not have the necessary information on Keystone Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
Transactions in Ethereum are very difficult to reverse, and there is no shortage of scams. Wallets have a role to play in helping users avoid known scams ahead of the user making the transaction.
Wallets are rated based on whether they alert the user about potential scams. This is measured along three scenarios: Does the wallet warn the user when...
For payments-focused wallets that do not support interacting with arbitrary contracts or external applications, only the payment scenario applies.
Note that wallets should only warn the user about such scenarios, not outright prevent the user from making such transactions, as preventing them entirely would limit the user's ability to have real sovereignty over their own wallet.
Wallets are also rated based on whether these warnings are implemented in a privacy-preserving manner. Specifically:
When sending funds, does the lookup for past interactions with that address unconditionally reveal the sender and recipient addresses to a third-party other than the wallet's default RPC provider for this chain?
When interacting with a contract, does the check whether that contract is known to be a scam reveal the user's IP address together with the contract address about to be interacted with?
When connecting to an application, does the check whether that application reveal the domain name or URL of the application being used?
It does not implement any form of scam alerting.
It leaks visited URLs to a third-party as part of its malicious app warning feature.
It implements some but not all of the required scam warning features.
It implements all required scam warning features, but not in a privacy-preserving manner.
It implements all required scam warning features in a privacy-preserving manner.
Keystone Wallet supports hardware wallets with full dApp signing implementation through this hardware wallet. All transaction details are clearly displayed on the hardware wallet screen for verification before signing, providing maximum security and transparency for users.
dApp Signing is a critical security feature for hardware wallets that allows users to verify transaction details directly on their hardware wallet's screen before signing. This verification step is crucial for preventing attacks where malicious software might attempt to trick users into signing transactions with different parameters than what they intended.
Without dApp signing, users must trust that the software wallet is displaying the correct transaction details and not manipulating them. With dApp signing, the hardware wallet shows the actual transaction details that will be signed, providing an independent verification mechanism that significantly enhances security.
Full dApp signing implementations ensure that all relevant transaction details (recipient address, amount, fees, etc.) are clearly displayed on the hardware wallet screen, allowing users to make informed decisions before authorizing transactions.
Hardware wallets are evaluated based on their implementation of dApp signing capabilities.
A hardware wallet receives a passing rating if it implements full dApp signing, where all transaction details are clearly displayed on the hardware wallet screen for verification before signing. This includes support for standard transactions, ERC-20 token transfers, 712 messages and complex contract interactions.
The hardware should be able to display clearly all transaction types on Safe, Aave and Uniswap. To do so the hardware MUST be able to connect directly to the dapp or allow the user to use at least two different software wallets independent from the hardware manufacturer.
A hardware wallet receives a partial rating if it implements dApp signing but with limitations, such as not displaying all transaction details or not supporting dApp signing for all transaction types. Or if the hardware supports only one independent software wallet. Or if the hardware supports only 1/3 of the dapps.
A hardware wallet fails this attribute if it doesn't properly implement dApp signing functionality, requiring users to trust the connected software wallet without independent verification.
It implements full dApp signing with hardware wallets, displaying all transaction details on the hardware wallet screen for verification before signing.
It implements partial dApp signing, where most but not all transaction details are displayed on the hardware wallet screen.
It implements basic dApp signing, but the implementation is limited and doesn't provide full transparency for all transaction details.
It supports hardware wallets but does not implement dApp signing.
It does not support hardware wallets at all.
Keystone Wallet implements a comprehensive bug bounty program that offers strong incentives for security researchers to find and report vulnerabilities. The program has a wide scope, competitive rewards, and a responsive disclosure process.
However, the wallet should still improve by providing a clearer upgrade path for users when security issues are identified.
Hardware wallets manage sensitive cryptographic keys and access to users' funds, making them high-value targets for attackers. Bug bounty programs incentivize security researchers to responsibly discover and disclose vulnerabilities, rather than exploit them.
A well-structured bug bounty program:
Additionally, hardware wallets should provide upgrade paths for users when critical security issues are discovered, as these physical devices can't always be fixed with simple software updates.
Hardware wallets are assessed based on the comprehensiveness of their bug bounty program:
Pass (Best): Implements a comprehensive bug bounty program with:
Partial: Implements a basic bug bounty program with limitations:
Fail: No bug bounty program or security update process:
It implements a comprehensive bug bounty program with clear incentives and responsive processes. It offers competitive rewards based on severity, has a transparent disclosure process, and provides upgrade paths for users.
It implements a basic bug bounty program with limited scope or rewards. However, it does provide a clear upgrade path for users when security issues are discovered.
It implements a vulnerability disclosure policy but does not offer formal rewards. It also lacks a clear upgrade path for users when security issues are discovered.
It does not implement any bug bounty program or vulnerability disclosure policy. It also lacks a clear process for providing security updates to address critical issues.
Keystone Wallet should establish a clearer upgrade path for users when security vulnerabilities are discovered, such as offering discounted replacements or firmware updates when possible.
Walletbeat's database does not have the necessary information on Keystone Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
Ensuring the security and transparency of the factory supply chain is vital to prevent tampering or compromise during manufacturing, packaging, and delivery. Users need confidence that the device they receive is genuine and hasn't been maliciously altered.
Evaluated based on:
Factory OPSEC: Availability and verification (audits, certifications) of documentation detailing security practices during manufacturing.
Tamper Evidence: Effectiveness of physical seals or mechanisms to detect package tampering.
Hardware Verification: Ease of verifying the received hardware against a Bill of Materials (BOM) or reference design.
Tamper Resistance: Physical device protections (e.g., security mesh) against unauthorized modification.
Genuine Check: Availability and reliability of software/hardware mechanisms to verify device authenticity before and during use.
Anti-Kleptography: Measures to prevent cryptographic keys or randomness from being subtly leaked during operations.
It passes all factory supply chain sub-criteria.
It passes some factory supply chain sub-criteria.
It fails most or all factory supply chain sub-criteria.
Walletbeat's database does not have the necessary information on Keystone Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
Firmware security and openness are critical for user trust, resistance against attacks, and ensuring the device can be safely upgraded. Users need assurance that the code running on their device is authentic and hasn't been tampered with. Openness allows for independent verification and community audit.
Evaluated based on several factors:
It passes most firmware sub-criteria.
It passes some firmware sub-criteria.
It fails most or all firmware sub-criteria.
Walletbeat's database does not have the necessary information on Keystone Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
Secure key handling is fundamental to the security of user funds. This includes how the master secret (seed) is generated, stored, and used. The device must protect keys from extraction via software or physical attacks (both passive side-channels and active fault injection). It should also ensure that the manufacturer cannot access or recover user keys.
Evaluated based on:
It passes most keys handling sub-criteria.
It passes some keys handling sub-criteria.
It fails most or all keys handling sub-criteria.
Walletbeat's database does not have the necessary information on Keystone Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
User safety features are crucial for ensuring users clearly understand the transactions and messages they are signing on their hardware device. This involves presenting information legibly (human-readable addresses/contracts/parameters), providing tools to verify raw data, offering risk analysis and transaction simulation, and preventing unintended actions.
Evaluated based on the following criteria (mapped to 16 internal sub-criteria):
Human readable addresses: Are raw addresses easy to review? Is the HWW displaying the ENS linked to an address if available?
Human readable identification of well known contracts: Is the HWW displaying information about well known contracts? How reliable is it (considering rogue proxies)? How independently chosen is it?
Possible to review all TX parameters raw: Are all raw parameters from a TX displayed? Easy to review (calldata…)?
Human readable review of TX parameters: Is the HWW displaying a human readable version of some/all parameters? Are there restrictions?
Coverage of human readable TX parameters reviewable: Describe how extensive/limited the display of human readable TX parameters is. Is it using independent data? How frequently is it collected and updated?
Easy to extend human readable TX parameters: Is it possible for the user to add support to get a human readable display of an unknown TX parameter? Describe the process.
Expert mode for TX review: Is there a mode available to sign the transaction quickly while displaying enough information to verify the TX on a secondary trusted computer?
Possible to review all EIP 712 parameters raw: Are all raw parameters from an EIP 712 message displayed? Easy to review (structures, byte arrays,…)?
Human readable review of EIP 712 parameters: Is the HWW displaying a human readable version of some/all parameters? Are there restrictions?
Coverage of human readable EIP 712 parameters reviewable: Describe how extensive/limited the display of human readable EIP 712 message parameters is. Is it using independent data? How frequently is it collected and updated?
Easy to extend human readable EIP 712 parameters: Is it possible for the user to add support to get a human readable display of an unknown parameter in an EIP 712 message? Describe the process.
Expert mode for EIP 712 review: Is there a mode available to sign an EIP 712 message quickly while displaying enough information to verify the EIP 712 message on a secondary trusted computer?
Risk analysis support: Is the HWW displaying a risk evaluation / threat warning to the user when signing transactions or messages? Describe how the evaluation works.
Risk analysis without phoning home possible: Is it possible to run the risk analysis process without contacting the HWW manufacturer? Describe which third parties are involved and if the full TX/message data could be recovered by a party.
Fully local risk analysis possible: Is it possible to run the risk analysis evaluation locally? Describe the components provided by the HWW provider and the setup.
TX simulation support: Is the HWW displaying high level simulation results (balance difference…) to the user when signing transactions or messages? Describe how the evaluation works.
TX simulation without phoning home possible: Is it possible to run the simulation process without contacting the HWW manufacturer? Describe which third parties are involved and if the full TX/message data could be recovered by a party.
Fully local TX simulation possible: Is it possible to run the simulation locally? Describe the components provided by the HWW provider and the setup.
Rating thresholds: PASS if >=11/16 criteria pass, PARTIAL if >=6/16 pass, else FAIL.
It passes 11 or more user safety sub-criteria.
It passes 6 to 10 user safety sub-criteria.
It passes 5 or fewer user safety sub-criteria.
Walletbeat's database does not have the necessary information on Keystone Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
Your wallet address is unique and permanent, which makes it easy for applications and companies like Chainalysis to track your activity. In web-privacy terms, it is worse than cookies: its record is permanent, publicly visible, and even tracks across multiple devices and websites. The more personal information is linkable to your wallet address, the more effective such tracking can be. It is therefore important to use a wallet that does its best to protect your information from being linked to your wallet address.
In order to qualify for a perfect rating on wallet address privacy, a wallet must not, by default, allow any third-party to link your wallet address to any personal information.
As Walletbeat only considers the wallet's default behavior, wallets may still choose to offer features that allow third-parties to link wallet addresses with personal information, so long as this is done with explicit user opt-in.
To determine this, Walletbeat looks at the network requests made by wallets in their default configuration, and the contents of such requests. If a request contains the user's wallet address, we look at whether it also contains any other personal information, such as the user's name, pseudonym, email address, phone number, CEX account information, etc.
Additionally, if such a request is not proxied, then it inherently reveals the user's IP address and ties it with the user's wallet address, which is also personal information.
It requires user information (other than IP address and pseudonyms) by default, and uploads this data to a third-party or records it onchain in a publicly-viewable manner.
It allows a third party to learn the relationship between a user's wallet address and their IP address by default. This is treated as a partial rating because users may mitigate against this by forcing wallet requests to be proxied on their own.
It requires the user to identify themselves via a pseudonym which is sent to a third-party or recorded onchain. This is treated as a partial rating because users may choose an arbitrary pseudonym for each of their wallet address to mitigate this privacy issue.
It does not require any user information to function by default, and proxies all network requests carrying the user's wallet address.
It relies exclusively on a user's self-hosted node, involving no third parties.
Walletbeat's database does not have the necessary information on Keystone Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
You probably have more than one wallet address configured in your wallet, which you use for different purposes and perhaps as different identities. These wallet addresses all belong to you, but you would rather keep that fact private. It is therefore important to use a wallet that does not reveal that fact.
Wallets are assessed based on whether a third-party can learn that two or more of the user's wallet addresses belong to the same user.
A third-party may learn of this correlation either through the wallet software explicitly sending this data (e.g. through analytics), or by requesting data about multiple wallet addresses in bulk, which allows the receiving endpoint to learn that all of these addresses belong to the same user. Similar correlations are also possible by IP and/or time-based correlation of requests that each contain one wallet address.
In order to prevent this information from being revealed, wallets can use a variety of strategies:
It refreshes multiple address balances by grouping all of these addresses in the same request.
It makes multiple simultaneous requests about each of the user's wallet balances, without proxying or staggering the requests.
It makes multiple simultaneous requests about each of the user's wallet balances, proxying each of them through a different proxy circuit (e.g. Tor with unique circuits for each wallet address). The receiving endpoint may still correlate these addresses through time-based correlation.
It makes multiple requests about each of the user's wallet balances, staggering them over time to avoid time-based correlation. The receiving endpoint may still correlate these addresses through IP-address-based correlation.
It makes multiple requests about each of the user's wallet balances, staggering them over time to avoid time-based correlation, and using unique proxy circuits for each wallet address to avoid IP-address-based correlation.
It distributes requests about each of the user's wallet balances across unique RPC endpoints owned by different entities, preventing any single entity from learning about more than one wallet address.
It only has one active wallet address at a time, and only ever makes requests about this wallet address and no other.
It runs by default with a user's own self-hosted node, preventing any third-party from learning about any of the user's wallet addresses.
Walletbeat's database does not have the necessary information on Keystone Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
Data posted on public blockchains like Ethereum is publicly available to everyone. This means that anyone can see your transaction history. You would not voluntarily post your bank statements or private purchase history online, yet this is what happens by default when transacting on public blockchains.
Many privacy solutions have emerged to solve this problem. However, to be actually usable by users, these solutions must be tightly integrated in wallets and easy to use. Walletbeat looks at whether wallets let users send, receive, and spend tokens privately by default.
In order to get a passing rating, wallets must ensure that sending Ether or ERC-20 tokens to other addresses comes with privacy guarantees by default. In addition, they must ensure that users can receive and spend such tokens privately.
"Privately" here means that other than the wallet user, no single entity (including any third-party provider) can infer or reconstruct the user's transaction history.
Walletbeat currently recognizes the following privacy-preserving token transfer solutions:
It does not support private token transfers.
Its default option when sending tokens is to perform a public token transfer.
It implements ERC-5564 Stealth Addresses and uses it by default for transfers. However, it does not let the user control which stealth addresses' balance is used when spending private balances, thereby potentially exposing unintended public onchain links between their stealth addresses.
Its token transfers are implemented using ERC-5564 Stealth Addresses by default. However, a third-party provider may learn of the correlation between the user's stealth addresses.
Its token transfers are implemented using ERC-5564 Stealth Addresses by default. However, when sending tokens, a third-party provider may learn of the correlation between the recipient's meta-address and their newly-generated stealth address, thereby de-anonymizing the recipient.
Its token transfers are implemented using ERC-5564 Stealth Addresses by default. However, when sending tokens, a third-party provider may learn of the correlation between the sender's meta-address or IP, and the recipient's newly-generated stealth address, thereby de-anonymizing the sender and recipient of the transfer.
Its token transfers are implemented using ERC-5564 Stealth Addresses by default. Each stealth address is refreshed in such a way that no third-party may learn about the correlation between these stealth addresses. When spending private balances, users control which stealth addresses are used. When sending tokens to another user's stealth address, no third-party may learn of the correlation between the sender and the recipient, or of the correlation between the recipient's meta-address and their newly-generated stealth address.
Walletbeat's database does not have the necessary information on Keystone Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
Hardware privacy ensures that the device itself does not leak sensitive user information (like IP address, public keys, or usage patterns) during setup, regular operation, or updates. This is distinct from the privacy features of the transactions created using the wallet.
Evaluated based on:
Phoning Home: Whether the device contacts manufacturer servers during setup, operation, or updates, and if these connections are necessary.
Inspectability: Ability to monitor and understand data exchanged if the device does phone home.
Wireless Privacy: Protection of data transmitted over wireless connections (e.g., BLE, WiFi) against local attackers.
It passes all hardware privacy sub-criteria: No phoning home, inspectable remote calls, and encrypted wireless communication.
It passes some hardware privacy sub-criteria.
It fails all hardware privacy sub-criteria: Device leaks privacy in all aspects.
Walletbeat's database does not have the necessary information on Keystone Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
Ethereum's design goes to painstaking lengths to ensure that users can run an Ethereum L1 node on commodity consumer-grade hardware and residential Internet connections. Running your own node gives you several important benefits:
Wallets are rated based on whether they allow the user to configure the RPC endpoint used for Ethereum mainnet, and whether such configuration is possible before any request is made to a third-party RPC endpoint by default.
It lets you configure the RPC endpoint used for Ethereum mainnet.
It does not let you configure the RPC endpoint used for Ethereum mainnet, but lets you add a custom chain with your own self-hosted node as RPC endpoint.
It lets you configure the RPC endpoint used for Ethereum mainnet, but makes requests to a third-party RPC provider before the user has a chance to modify this RPC endpoint configuration.
It uses a third-party Ethereum node provider and does not let you change this setting.
Walletbeat's database does not have the necessary information on Keystone Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
Question: What if a wallet's dev team walked away or turned evil one day?
One of Ethereum's core promises as an Internet upgrade is to avoid the possibility for user lock-in of web2. This is achieved by ensuring accounts are permissionlessly portable across wallets.
Ensuring that accounts remain portable avoids wallets becoming lock-in vectors in web3. Permissionless account portability also keeps the wallet ecosystem healthy through open competition.
Wallets are rated based on whether accounts created within can be exported out of the wallet and imported into another, without requiring permission from the exporter wallet provider.
For EOA wallets based on private keys, this is relatively straightforward to determine. However, for more complex situations such as multisig wallets, Walletbeat considers whether such wallets can be made fully self-custodial, and whether assets and tokens can be permissionlessly transferred out of the wallet.
Specifically:
EOA wallets are rated based on the exportability of their private key material, and on whether such private key material is derived using the following standards:
MPC wallets are rated based on whether the user has a sufficient shares of the underlying key to have full control over the wallet in a self-custodial manner. Additionally, there must be a way for the user to generate a transaction (Walletbeat uses a token transfer out of the wallet as the litmus transaction for this) without reliance on a third-party API or proprietary application. The combination of these factors ensures that the wallet remains self-custodial and that the account cannot be frozen in-place due to an uncooperative third party.
ERC-4337 (smart contract wallets) are rated based on
the level of control the user has over their account according to the
smart contract's control logic that the wallet uses. The user must be
in control of who controls their account by default, and be able to
permissionlessly create asset transfer transactions.
Specifically, the rating considers:
EIP-7702 are not yet rated on account portability and will show up as "Unrated".
If a wallet supports multiple types of accounts, the rating for the account type it supports that is least portable takes precedence. This makes the final rating act as an effective "floor" across the account types the wallet supports.
If a wallet supports multiple types of accounts and all of them have the same level of portability, the account type that takes precedence is the one that the wallet offers the user to create by default.
It is an EOA wallet that does not use common seed phrase derivation standards for EOA key derivation, and does not allow the user to export their private keys.
It is an MPC wallet where the user does not have sufficient key shares under self-custody to unilaterally control the account by default.
It is an MPC wallet where the user is in self-custody of sufficient key shares to unilaterally control the account, but cannot generate a token transfer transaction without relying on a third party API.
It is an ERC-4337 (smart contract) wallet where the control logic of the smart contract is such that the user cannot update it to have the user's own private keys as the sole controlling keys of the account.
It is an ERC-4337 (smart contract) wallet over which the user does not have full self-custodial control by default, and needs to rely on a third-party API or proprietary software to modify this.
It is an ERC-4337 (smart contract) wallet over which the user has full self-custodial control by default, but still needs to rely on a third-party API or proprietary software to generate a valid token transfer transaction.
It is an EOA wallet that does not use common seed phrase derivation standards for EOA key derivation, but does allow the user to export private keys so that they can be imported into other wallets.
It is an MPC wallet where the user is in self-custody of sufficient key shares to unilaterally control the account, but cannot generate a token transfer transaction without the use of proprietary software.
It is an ERC-4337 (smart contract) wallet over which the user does not have full self-custodial control by default, but can create a transaction that modifies this using standalone open-source software.
It is an MPC wallet where the user is in self-custody of sufficient key shares to unilaterally control the account, and can generate a token transfer transaction using standalone open-source software which does not rely on any third party API.
It is an ERC-4337 (smart contract) wallet over which the user has full self-custodial control by default, and can create token transfer transactions using solely open-source software without relying on a third-party API.
Walletbeat's database does not have the necessary information on Keystone Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
One of the core tenets of Ethereum is censorship resistance. This means that users must be able to reliably get transactions included onchain, without the ability for intermediaries to prevent this from happening.
This property is critical to ensure that all Ethereum participants are provided equal-opportunity, unfettered access to Ethereum, and to ensure that Ethereum is resilient to attackers that would want to prevent others from using Ethereum on such footing.
In order to uphold this property on Ethereum L2s, users must be able to force transactions to be included on L2 chains as well. Most L2s implement such functionality by allowing L2 transactions to be submitted on the L1, and enforcing that their sequencing logic must respect such L1 force-inclusion requests by including them on the L2 chain, typically within some fixed duration.
By verifying that the wallet supports L2 force-withdrawal transactions, this attribute verifies censorship resistance at both levels: L1 and L2.
Wallets are rated based on whether users need to trust any intermediary in order to withdraw their funds from L2s.
This fundamentally requires two major features:
With these two features in place, users can withdraw their L2 funds without trusting intermediaries.
Walletbeat currently only considers OP Stack chains and Arbitrum One for this evaluation, but more L2 chains may be added as support for force-withdrawal transaction becomes feasible for them.
It supports force-withdrawal transactions on L2s, and can be configured to broadcast this transaction using a user's self-hosted L1 node.
It supports force-withdrawal transactions on L2s, and supports directly gossipping such transactions over the Ethereum L1 network.
It supports force-withdrawal transactions on L2s, but requires the use of a third-party RPC provider to submit the L1 transaction that it would take to initiate this force-withdrawal transaction.
It supports force-withdrawal transactions on some L2s, but not all of the L2s that are configured out of the box.
It does not support force-withdrawal transactions on L2s.
Walletbeat's database does not have the necessary information on Keystone Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
Free and Open Source Software (FOSS) licensing allows a software project's source code to be freely used, modified and distributed. This allows better collaboration, more transparency into the software development practices that go into the project, and allows security researchers to more easily identify and report security vulnerabilities. In short, it turns software projects into public goods.
Wallets are assessed based whether the license of their source code meets the Open Source Initiative's definition of open source .
It is licensed under a license that represents a commitment to switch to a Free and Open Source Software (FOSS) license by a specific date. Examples of such licenses include BUSL .
It is licensed under any non-FOSS (proprietary) license.
Its source code repository is missing a license file. The lack of a license file may be an accidental omission on the wallet developers' part, but also may indicate that the wallet may set its license to a proprietary license. Therefore, Walletbeat makes the conservative assumption that the wallet is not be Free and Open Open Source Software until it does have a valid license file.
Walletbeat's database does not have the necessary information on Keystone Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
When using a wallet, users are entrusting it to preserve their funds safely. This requires a high level of trust in the wallet's source code and in the wallet's development team. By making the wallet's source code visible to the public, its source code can be more easily inspected for security vulnerabilities and for potential malicious code. This improves the wallet's security and trustworthiness.
Wallets are assessed based on whether or not their source code is publicly visible, irrespective of the license of the source code.
If a wallet's source code is visible, it passes. If not, it fails.
Walletbeat's database does not have the necessary information on Keystone Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
Wallets are complex, high-stakes pieces of software. They must be maintained, regularly audited, and follow the continuous improvements in the ecosystem. This requires a reliable, transparent source of funding.
Wallets are assessed based on how sustainable, transparent, and user-aligned their funding mechanisms are.
Wallets are typically funded by one or more of the following methods:
Walletbeat looks at each funding source of funding and verifies whether it is done transparently and in a user-aligned manner. In this context, "user alignment" refers to whether a source of funding grows as a function of the user's own goals, rather than being uncorrelated or anti-correlated. For example, funding acquired through hidden swap fees or governance token sales with undisclosed insider token allocations are not user-aligned. Funding acquired through transparent swap fees, user donations, or ecosystem grants are user-aligned.
In order to pass this criterion, wallets must have at least one source of funding, and all of their sources of funding must be transparent to users. Additionally, if the wallet is funded from multiple sources and some of these sources are not user-aligned, the public must be able to determine the proportion of each such funding source to the wallet's overall revenue. Depending on the funding mechanism, this can be done through publication of a revenue breakdown page, public regulatory filings, or token allocation and vesting disclosures.
It has funding but has not revealed this publicly and transparently to users.
It does not have any funding. Wallets must have sustainable funding sources in order to remain secure and up-to-date.
It is funded from hidden swap fees. While users can look this up onchain to see how much revenue the wallet is generating from this, making this funding source technically transparent, it is not user-aligned.
It is funded from user-visible swap fees and governance token sales with undisclosed vesting schedule. While users can use onchain lookups to determine how much revenue is generated from both sources, making the funding technically transparent, the undisclosed nature of governance token makes makes this not user-aligned.
It is funded from user-visible swap fees and pre-disclosed governance token sales.
It is funded from venture capital and publishes regulatory filings showing the amount raised in each round and the top investors of each round.
It is funded from onchain donations, onchain ecosystem grants, and commemorative NFT sales.
Walletbeat's database does not have the necessary information on Keystone Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
Fee transparency is crucial for users to understand the full cost of their transactions. Without clear fee information, users may be surprised by high transaction costs or hidden fees charged by the wallet.
Transparent fee disclosure helps users make informed decisions about when to transact and which wallet to use. It also builds trust between users and wallet providers by ensuring that all costs are clearly communicated upfront.
Additionally, understanding the purpose of a transaction is important for security. When users can clearly see what they're authorizing (e.g., a token swap, NFT purchase, or contract interaction), they're less likely to approve malicious transactions.
Wallets are evaluated based on how transparently they display transaction fees and transaction purposes to users.
A wallet receives a passing rating if it provides comprehensive fee information, including detailed breakdowns of network fees, clear disclosure of any additional wallet fees, and clear explanation of transaction purposes.
A wallet receives a partial rating if it provides some fee information but lacks complete transparency in one or more areas.
A wallet fails this attribute if it provides minimal or no fee information before transaction confirmation.
It provides comprehensive fee information, including detailed breakdowns of network fees, clear disclosure of any additional wallet fees, and clear explanation of transaction purposes.
It provides detailed information about network fees, but may not fully disclose additional wallet fees or clearly show transaction purposes.
It provides basic information about transaction fees, but the information is limited and may not include a breakdown of costs.
It does not provide clear information about transaction fees before users confirm transactions.
Walletbeat's database does not have the necessary information on Keystone Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
A manufacturer's reputation reflects its track record in product design, long-term availability and support, handling of vulnerabilities, and engagement with the security community. A strong reputation builds user trust in the reliability and security of the hardware wallet.
Evaluated based on an aggregate of factors:
Product Originality: Degree of original design versus reliance on third-party components.
Availability & Support: History of product availability, risk of discontinuation, and perceived ability to honor warranty/support.
Vulnerability History: Track record of security vulnerabilities, their severity, and the transparency/quality of documentation and fixes.
Bug Bounty Program: Scope and rewards of the manufacturer's bug bounty program compared to industry standards.
It passes most reputation sub-criteria.
It passes some reputation sub-criteria.
It fails most or all reputation sub-criteria.
Walletbeat's database does not have the necessary information on Keystone Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
User experience on Ethereum has historically suffered from the limitations of Externally-Owned Accounts (EOAs), which is the type of account most Ethereum users use today. By contrast, smart wallet accounts offer many UX and security improvements, such as the ability to:
However, smart wallet accounts have historically been an all-or-nothing, wallet-specific proposition for users. There was no transition path to such wallets.
As part of the Pectra upgrade , EIP-7702 changes this situation by allowing a clean path for existing EOAs to obtain all of the UX benefits of smart wallet accounts and account abstraction, without the need for users to switch to a different account address. This represents a large User Experience upgrade for all Ethereum EOA users.
Wallets are rated based on whether they make use of EIP-7702 transactions (for EOA or MPC wallets), or if they support ERC-4337 transactions (for smart contract wallets).
Because the user experience benefits of these enhancements are still in-flight and are expected to develop as these standards mature and are built on top of, Walletbeat does not currently consider which improvements wallets provide for their users as a result of these new capabilities. However, it is expected that a future version of this attribute would look at such improvements; for example, to verify that users are able to update the signing authority of their wallets to a quantum-safe signature scheme.
It supports EOA accounts and can use Account Abstraction features via EIP-7702: Account Abstraction via smart contract authority delegation.
It supports smart wallet accounts using ERC-4337: Account Abstraction for smart contract wallets.
It only supports plain EOAs without Account Abstraction features.
It only supports MPC wallets without Account Abstraction features.
Walletbeat's database does not have the necessary information on Keystone Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
Ethereum addresses are hexadecimal strings (0x...
) which are
unreadable to humans. Phishing scams and exploits have used this to
trick users into sending funds to invalid addresses, for example by
generating lookalike-addresses and tricking users into copy/pasting
them without noticing the difference.
Additionally, Ethereum's transition to layer 2s has changed user needs when sending funds. The hexadecimal address isn't sufficient anymore; the user needs to ensure that they are sending funds to the correct hexadecimal address on the correct chain, increasing the potential for mistakenly sending funds to the wrong place or the wrong chain.
Address naming registries like ENS partially solve this problem by
allowing more human-readable names like username.eth
to be
automatically turned into the hexadecimal address. This is easier to
share and to accurately transfer by humans. Additionally, some address
format standards improve upon this further by including the destination
chain information as part of the address itself. Such standards include:
[email protected]
user.eth:l2chain
Wallets that support either of these standards are able to automatically determine the destination address and chain from a human-readable string, and can bridge funds across chains as appropriate. This improves the user experience of Ethereum and its layer 2 ecosystem while reducing the potential for mistakes when sending funds.
Wallets are rated based on the types of addresses they support sending funds to.
Specifically, Walletbeat recognizes the following destination address formats:
username.eth
) without destination chain information[email protected]
user.eth:l2chain
Wallets must resolve either ERC-7828 or ERC-7831 addresses to fulfill this attribute. Support for plain ENS addresses alone earns a partial rating.
Additionally, the mechanism used to do the resolution must either:
It only supports sending funds to raw (0x...
) addresses.
It only resolves plain ENS addresses (username.eth
) which do not include a destination chain.
Walletbeat's database does not have the necessary information on Keystone Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
Interoperability ensures the wallet can be used with independent third-party wallets and does not leak identifying metadata to the supplier.
Evaluated based on third-party wallet compatibility and supplier independence.
It passes both interoperability sub-criteria.
It passes one interoperability sub-criteria.
It fails one or both interoperability sub-criteria.
Walletbeat's database does not have the necessary information on Keystone Wallet to assess this question.
Please help us by contributing your knowledge on our repository !
Good maintenance practices ensure the long-term usability, reliability, and physical durability of a hardware wallet. This includes the device's resistance to physical damage, the availability of repair information and parts, battery longevity and replaceability, and the manufacturer's warranty policy.
Evaluated based on:
Physical Durability: Resistance to drops and environmental factors.
MTBF Documentation: Availability and reliability of Mean Time Between Failures data.
Repairability: Ease of repair, availability of parts and documentation, and potential security implications of repairs.
Battery: Presence, replaceability, and device functionality if the battery dies.
Warranty: Length of warranty period, coverage limitations, and possibility of extension.
It passes most maintenance sub-criteria.
It passes some maintenance sub-criteria.
It fails most or all maintenance sub-criteria.