
Identity protection without trust
WiKey's zero-knowledge engine doesn't use personal information for account access or recovery.
Passwords or text messages or recovery email not used.
It therefore protects against takeovers.
WiKey's zero-knowledge engine doesn't use personal information for account access or recovery.
Passwords or text messages or recovery email not used.
It therefore protects against takeovers.
WiKey not only protects your email, ERP, CRM, and other accounts, but it also protects your crypto wallet.
It ensures that your wallets' secret phrase will not get lost or hacked. The system is self custody so no one has access to your secret key, not even us
WiKey's IOS or Android app locally and randomly generates your passkeys.
Login with finger or face ID to login to any SAML / FIDO2 / Passkeys / Webauthn compliant website or SaaS.
No biometric information is stored on any server
Legacy IAM solutions struggle to cope with today's hackers. AI, deepfake, and other methods can easily bypass 2FA, MFA, passkey implementations and user recovery. WiKey offers a complete, modern SaaS IAM solution that understands and protects against unauthorized access to your databases and apps
In a typical passkey implementation, passkeys, your ID or biometrics are backed up. This is done to help restore access if a user loses his phone.
However, this also introduces a single point of failure, as hackers can target the recovery process and fetch the keys
AI and deepfake blur the lines between hackers and authentic individuals. Personal data on social networks can be exploited to hack the password recovery process
Passwords can be compromised through reuse, phishing or poor backups.
A hacker can impersonate you, contact your phone provider, request a new SIM card and hack the password recovery
Safely backing up passwords and web3 secret keys is hard.
Physical storage can be compromised. Cloud and local drives are susceptible to viruses that can obtain your secrets
WiKey is a fully self-custody.
Your passwords, secret phrases or keys are not backed up anywhere.
They are not accessible by anyone, not even us.
To recover a lost phone, contact your circle of co-workers or family and ask them to verify you.
No predefined questions or text messages or emails are used as they can be hacked.
WiKey is trustless: Your circle of helpers, or anyone else, have no knowledge of your secret keys and passwords, and you'll be notified when recovery starts
A user may be the sole holder of credentials for certain servers, ERPs, databases, etc, may leave due to passing away or being terminated.
With WiKey, their superiors can revoke their access and assign the credentials to others.
In this zero knowledge process, none of the superiors can access the passkeys during or following the event
With WiKey phishing can be eliminated as you use biometrics to login, without backing them up.
No more hard to invent and to remember passwords, so no reuse of passwords
WiKey follows the FIDO2 standard, making every FIDO2 compliant site or SAAS compatible with WiKey
learn more
Your organization can easily verify the integrity, security
Login with the WiKey app. No need to remember or hide passwords.
WiKey is decentralized without a database.
Your data and configuration is immutable and can't be controlled, or governed by anyone, not even us
The platform is completely anonymous, you don't submit any personal detail, email, or phone number
AI can't hack into the personal knowledge among friends, co-workers, or relatives.
With WiKey, users declare helpers to verify them only when phone is lost.
If you don't lose your phone, just log in without your helpers.
If you lose your phone, install the app on your new device and regain access by verifying your identity with your helpers.
For enterprises, designated helpers can be pre-configured for employees,