🛡️
FailSafe Knowledge Centre
CtrlK
  • Introduction
    • Defence-in-Depth
    • Forward Security
  • Web3 Threats
  • Defence-in-Depth & the Lifecycle of a Transaction
    • Defence 1: De-risk Web3 Asset Positions
    • Defence 2: FailSafe Blockchain Reconnaissance
    • Defence 3: FailSafe Interceptor Service
  • FailSafe Architecture
    • Forward Security in FailSafe
      • Quantum Threats to EVM-based Blockchains
      • On ECDSA Key Re-use
      • On New Quantum-resilient Alternatives
      • Account Abstraction as a Path to Sunseting ECDSA on Ethereum?
    • Introducing the Quantum Migration Tool (qMig)
      • How Does qMig work?
      • Discussion
      • FailSafe + qMig
  • Module Overviews
    • FailSafe Guard
      • FailSafe Proof (Attestation Service)
    • FailSafe Interceptor
    • FailSafe Radar (Fraud and Risk Scoring API)
      • Address Screening
      • Asset Movement Graph Cluster
  • How FailSafe Helps Your Organisation
    • Reduce Attack Surface Area
    • Mitigate Security Risks
    • Real-Time Threat Response
    • Forward Security against Looming Quantum Computing Threats
  • FailSafe as a tool for Enterprise Risk Management
  • Frequently Asked Questions
    • General FAQs
    • FailSafe Guard FAQs
      • How does FailSafe Interceptor work?
      • What is FailSafe Recovery Vault?
      • What is FailSafe Interceptor’s coverage of pending transactions?
      • What type of assets can FailSafe Interceptor protect?
      • Which networks is Interceptor currently supporting?
      • In what scenarios is FailSafe Interceptor typically useful?
      • What happens if an attacker uses an abnormally high gas fee?
      • What if the attacker is using MEV protection RPCs to steal funds?
      • Is the FailSafe Recovery Vault wallet safe? Can it be exploited?
      • What are the risks associated with granting approvals to the Recovery Vault?
      • How can I verify that Recovery Vault can move assets unidirectionally?
      • Does FailSafe require my private keys in order to protect funds?
      • If my private key is exposed, can an attacker disable the Interceptor using the private key?
      • Is FailSafe Interceptor open source?
    • FailSafe Radar FAQs
  • Conclusion
Powered by GitBook
On this page

How FailSafe Helps Your Organisation

Reduce Attack Surface AreaMitigate Security RisksReal-Time Threat ResponseForward Security against Looming Quantum Computing Threats
PreviousAsset Movement Graph ClusterNextReduce Attack Surface Area