of crypto assets stolen in the first three months of 2019
have seen large-scale hacks in 2019 so far
in cryptocurrency thefts, scams, and fraud in Q1 2019
The simplest example is for Lacero to provide an independent authentication rail – which may not even have policy artefacts loaded.
Lacero can be easily inserted into a client backend process and into a proprietary (or third-party) wallet through APIs. Lacero is responsible for enforcing the client’s policy (which can be as simple or complex as the client requires), then signing a transaction request when the policy has been met, before passing the transaction into the wallet infrastructure for final execution.