Sodot

Sodot

Technology, Information and Internet

Powerful MPC infrastructure for crypto custodians and wallets

עלינו

Sodot is an MPC (Multi-party computation) infrastructure company, that enables crypto custody and wallet providers to leverage highly performant MPC to generate and manage private keys, elevating the security and UX of their product while staying in full control. We provide an MPC SDK designed for the needs of Web3 enterprises that can be run fully on-prem, provides data privacy, maximizes operational independence and leverages cutting-edge technology to achieve industry-leading performance (<5ms signing). Co-founded by a seasoned team, Sodot draws from over 20 years of collective experience in MPC and security. Our team's expertise spans across multiple sectors, including the private sector, public sector, elite cybersecurity intelligence units and academia.

אתר אינטרנט
https://sodot.dev
תעשייה
Technology, Information and Internet
גודל החברה
11-50 עובדים
משרדים ראשיים
Tel Aviv
סוג
בבעלות פרטית

מיקומים

עובדים ב- Sodot

עדכונים

  • Episode 2 on 𝗔𝗜 𝗔𝗴𝗲𝗻𝘁𝘀 𝘅 𝗖𝗿𝘆𝗽𝘁𝗼 🚀 What does it actually look like in practice?

    צפייה בפרופיל של Shalev Keren, גרפיקה

    Co-Founder and CTO @ Sodot

    𝗔𝗜 𝗔𝗴𝗲𝗻𝘁𝘀 𝘅 𝗖𝗿𝘆𝗽𝘁𝗼: 𝗪𝗵𝗮𝘁 𝘄𝗶𝗹𝗹 𝘁𝗵𝗮𝘁 𝗹𝗼𝗼𝗸 𝗹𝗶𝗸𝗲 𝗶𝗻 𝗽𝗿𝗮𝗰𝘁𝗶𝗰𝗲? In my last post, [link in the comments] we touched on how AI agents could use seamless payment systems (like stablecoins) to interact with the world in real time. Today, let’s imagine what this might look like for something practical—a 3-night hotel booking. 𝗛𝗲𝗿𝗲’𝘀 𝘁𝗵𝗲 𝘀𝗰𝗲𝗻𝗮𝗿𝗶𝗼: You casually decide to treat yourself to a short getaway. You give your AI agent a simple instruction: “Find me a decent hotel near the beach around Port Kaligro with good Wi-Fi and a tub, $200 per night max.” This is where things get interesting: 1️⃣ 𝗔 𝗕𝗿𝗼𝘄𝘀𝗲𝗿-𝗟𝗶𝗸𝗲 𝗚𝗲𝗻𝗲𝗿𝗮𝗹𝗶𝘀𝘁 𝗔𝗜 𝗔𝗴𝗲𝗻𝘁 𝗚𝗲𝘁𝘀 𝘁𝗼 𝗪𝗼𝗿𝗸 Your generalist AI agent knows it’s not a travel expert—it’s smart enough to outsource. It hands off the task to a specialized hotel-booking AI that’s designed to: • Search dozens of booking platforms for live availability. • Match your preferences (beachside, good Wi-Fi, budget-friendly). • Account for personal quirks it knows about you (e.g. you love a good view of nature). In seconds, the hotel-booking AI sends back precise details: • Ocean Breeze Resort, Dec 20–23, $180 per night. 2️⃣ 𝗠𝗮𝗸𝗶𝗻𝗴 𝘁𝗵𝗲 𝗥𝗲𝘀𝗲𝗿𝘃𝗮𝘁𝗶𝗼𝗻 Now your generalist agent takes the reins again. With the exact details in hand, it passes the info to a simple, specialized booking tool (probably not AI-based). This tool handles the technical stuff—locking in your booking, confirming payment, and generating the reservation number. 3️⃣ 𝗗𝗼𝗻𝗲! Within moments, your AI agent sends you this: “Booked! Ocean Breeze Resort, Dec 20–23, $540 total. Have a great trip!” You didn’t scroll endlessly through a booking site, enter payment and personal details, or deal with reading reviews for every potential property. The whole process was fast, precise, and hassle-free. 𝗛𝗼𝘄 𝗪𝗼𝘂𝗹𝗱 𝗣𝗮𝘆𝗺𝗲𝗻𝘁𝘀 𝗪𝗼𝗿𝗸? Here’s where automated payment systems come in. Stablecoins are a great fit for this use case: • They only need a wallet to send, receive, and temporarily store funds—no clunky credit card forms or bank accounts set up. • They’re fast, with transactions settling in seconds. • No exorbitant conversion fees or delays when dealing with international currencies. Sure, this could be done with traditional payment rails, but stablecoins make the process simpler, faster, and more direct. 𝗪𝗵𝘆 𝗗𝗼𝗲𝘀 𝗧𝗵𝗶𝘀 𝗠𝗮𝘁𝘁𝗲𝗿? This is just one example of how AI agents will streamline complex tasks. As they evolve, these systems will get even better at coordinating specialized tools, making real-world interactions smarter and more efficient.

  • צפייה בדף הארגון של Sodot, גרפיקה

    730 עוקבים

    🚨 𝗢𝘃𝗲𝗿 $𝟭.𝟱𝗕 𝗦𝘁𝗼𝗹𝗲𝗻: 𝗧𝗼𝗽 𝟯 𝗖𝗿𝘆𝗽𝘁𝗼 𝗛𝗮𝗰𝗸𝘀 𝗼𝗳 𝘁𝗵𝗲 𝗟𝗮𝘀𝘁 𝗕𝘂𝗹𝗹 𝗠𝗮𝗿𝗸𝗲𝘁 𝗮𝗻𝗱 𝗞𝗲𝘆 𝗧𝗮𝗸𝗲𝗮𝘄𝗮𝘆𝘀 🚨 The last crypto bull market (2021-2022) saw incredible growth, but it also revealed serious security vulnerabilities in the ecosystem. Here’s a recap of 𝟯 𝗼𝗳 𝘁𝗵𝗲 𝗯𝗶𝗴𝗴𝗲𝘀𝘁 𝗵𝗮𝗰𝗸𝘀, their causes, and what we can learn: 𝟭. 𝗣𝗼𝗹𝘆 𝗡𝗲𝘁𝘄𝗼𝗿𝗸 𝗛𝗮𝗰𝗸 (𝗔𝘂𝗴𝘂𝘀𝘁 𝟮𝟬𝟮𝟭 | $𝟲𝟭𝟬𝗠 𝗟𝗼𝘀𝘀) 🔎 What happened? Attackers exploited a flaw in Poly Network’s smart contracts, bypassing authentication for cross-chain transactions and transferring funds to their wallets. 𝟮. 𝗪𝗼𝗿𝗺𝗵𝗼𝗹𝗲 𝗕𝗿𝗶𝗱𝗴𝗲 𝗛𝗮𝗰𝗸 (𝗙𝗲𝗯𝗿𝘂𝗮𝗿𝘆 𝟮𝟬𝟮𝟮 | $𝟯𝟮𝟱𝗠 𝗟𝗼𝘀𝘀) 🔎 What happened? Wormhole, a token bridge between Ethereum and Solana, was exploited when an attacker bypassed signature verification by exploiting a deprecated function. 𝟯. 𝗥𝗼𝗻𝗶𝗻 𝗡𝗲𝘁𝘄𝗼𝗿𝗸 𝗛𝗮𝗰𝗸 (𝗠𝗮𝗿𝗰𝗵 𝟮𝟬𝟮𝟮 | $𝟲𝟮𝟱𝗠 𝗟𝗼𝘀𝘀) 🔎 What happened? This hack went unnoticed for six days until a user reported being unable to withdraw 5,000 ETH from the bridge. In this case, the attacker compromised private keys and took advantage of a problematic validator decentralization structure. 🔑 𝗞𝗲𝘆 𝗟𝗲𝘀𝘀𝗼𝗻𝘀 𝗳𝗿𝗼𝗺 𝗧𝗵𝗲𝘀𝗲 𝗛𝗮𝗰𝗸𝘀 1️⃣ 𝗦𝗲𝗰𝘂𝗿𝗲 𝗞𝗲𝘆 𝗠𝗮𝗻𝗮𝗴𝗲𝗺𝗲𝗻𝘁: Build a key management infrastructure that eliminates single points of failure, alongside disaster recovery mechanisms for a resilient and reliable security posture. 2️⃣ 𝗥𝗼𝗯𝘂𝘀𝘁 𝗔𝗰𝗰𝗲𝘀𝘀 𝗖𝗼𝗻𝘁𝗿𝗼𝗹 𝗮𝗻𝗱 𝗣𝗼𝗹𝗶𝗰𝗶𝗲𝘀: Establish a robust policy engine to define permissions, enforce controls, and mitigate risks of blind signing accidental or malicious transactions. 3️⃣ 𝗣𝗿𝗼𝘁𝗼𝗰𝗼𝗹 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆: Protocols, particularly cross-chain, require enhanced security measures and ongoing monitoring to prevent attacks or to respond immediately in the event an attack occurs. 📌 𝗪𝗵𝗮𝘁 𝗔𝗯𝗼𝘂𝘁 𝗧𝗵𝗶𝘀 𝗕𝘂𝗹𝗹 𝗠𝗮𝗿𝗸𝗲𝘁? The industry has come a long way since the last bull market, with advancements in key management and transaction/protocol security. The next attack can be prevented with effective risk management. For upgrading your key management security—schedule a call with our experts today https://lnkd.in/dXrqQCJu

    • אין תיאור טקסט חלופי לתמונה הזו
  • צפייה בדף הארגון של Sodot, גרפיקה

    730 עוקבים

    Insights about the recent developments of Google's quantum computer and its implications on crypto 👇

    צפייה בפרופיל של Shalev Keren, גרפיקה

    Co-Founder and CTO @ Sodot

    🚨 𝗚𝗼𝗼𝗴𝗹𝗲’𝘀 𝗤𝘂𝗮𝗻𝘁𝘂𝗺 𝗟𝗲𝗮𝗽: 𝗦𝗵𝗼𝘂𝗹𝗱 𝗖𝗿𝘆𝗽𝘁𝗼 𝗕𝗲 𝗖𝗼𝗻𝗰𝗲𝗿𝗻𝗲𝗱? 🚨 Google’s announcement of the Willow quantum chip has stirred up conversations—and some panic—about the security of blockchains and digital signatures. Let’s unpack it: 1️⃣ 𝗜𝘁’𝘀 𝗡𝗼𝘁 𝗝𝘂𝘀𝘁 𝗔𝗯𝗼𝘂𝘁 𝗖𝗿𝘆𝗽𝘁𝗼: The digital signature algorithms securing blockchains also protect everything from online banking to digitally signed contracts and software updates. If they were ever compromised, it wouldn’t just be a crypto problem—it would be an internet problem. Crypto shouldn’t be in the spotlight of worry here. 2️⃣ 𝗧𝗵𝗲 𝗥𝗲𝗮𝗹𝗶𝘁𝘆 𝗼𝗳 𝘁𝗵𝗲 𝗡𝘂𝗺𝗯𝗲𝗿𝘀: Willow boasts 105 qubits—a significant technical feat. But to challenge the cryptographic security we rely on today, researchers estimate ~13 million qubits would be needed. That’s an enormous gap. 3️⃣ 𝗪𝗲’𝘃𝗲 𝗦𝗲𝗲𝗻 𝗧𝗵𝗶𝘀 𝗕𝗲𝗳𝗼𝗿𝗲: Remember the quantum supremacy buzz back in 2019? Google made bold claims then, too, and while exciting, they were later refuted. Panic ensued then too, so we should keep these types of news in perspective. 4️⃣ 𝗟𝗼𝗼𝗸𝗶𝗻𝗴 𝗔𝗵𝗲𝗮𝗱 - 𝗚𝗿𝗼𝘄𝘁𝗵 𝗥𝗲𝗮𝗹𝗶𝘁𝗶𝗲𝘀: Even if qubit growth follows a consistent exponential trend (and that’s a big "if"), it would still take at least 17 years to reach the scale required to challenge digital signature algorithms. 𝗪𝗵𝗮𝘁’𝘀 𝘁𝗵𝗲 𝗧𝗮𝗸𝗲𝗮𝘄𝗮𝘆? Quantum computing is advancing and will undoubtedly revolutionize fields like material science, AI, and cryptography research. But when it comes to breaking digital signatures, we are still far from this being a practical reality. So let’s celebrate the innovation in quantum computing without hitting the panic button. https://lnkd.in/djSUc-SC

    Meet Willow, our state-of-the-art quantum chip

    Meet Willow, our state-of-the-art quantum chip

    blog.google

  • צפייה בדף הארגון של Sodot, גרפיקה

    730 עוקבים

    "Degen is looking to switch service providers, but Conduit reportedly won’t release the multi-signature keys needed to migrate." This is a perfect example of why NO VENDOR LOCK-IN is critical. Choosing self-hosted solutions ensures you operate without limitations or dependencies.

    צפייה בפרופיל של Ido Sofer, גרפיקה

    Co-Founder & CEO @ Sodot

    𝗩𝗲𝗻𝗱𝗼𝗿 𝗹𝗼𝗰𝗸-𝗶𝗻 𝗶𝘀 𝗲𝘃𝗲𝗿𝘆 𝗯𝘂𝘀𝗶𝗻𝗲𝘀𝘀 𝗼𝘄𝗻𝗲𝗿’𝘀 𝗻𝗶𝗴𝗵𝘁𝗺𝗮𝗿𝗲 Whenever my team evaluates a service provider, one of my first questions is: “𝘞𝘩𝘢𝘵 𝘸𝘰𝘶𝘭𝘥 𝘢 ‘𝘥𝘪𝘷𝘰𝘳𝘤𝘦’ 𝘭𝘰𝘰𝘬 𝘭𝘪𝘬𝘦, 𝘢𝘯𝘥 𝘸𝘩𝘢𝘵 𝘢𝘳𝘦 𝘵𝘩𝘦 𝘴𝘸𝘪𝘵𝘤𝘩𝘪𝘯𝘨 𝘤𝘰𝘴𝘵𝘴?” The situations where I’d feel comfortable with vendor lock-in are extremely rare. At Sodot, 𝗡𝗼 𝘃𝗲𝗻𝗱𝗼𝗿 𝗹𝗼𝗰𝗸 is a core principle of our MPC infrastructure solution. Our customers can switch providers at any time—without needing our help. And if they do need assistance, we’ll be there to support them. Why? Because we believe it’s on us to provide superior solutions and exceptional customer service to earn and keep our customers’ trust. https://lnkd.in/dTS4kpu6

    'Not your keys, not your blockchain': DEGEN L3 can't switch 'rollup-as-a-service' providers from firm holding its keys

    'Not your keys, not your blockchain': DEGEN L3 can't switch 'rollup-as-a-service' providers from firm holding its keys

    theblock.co

  • צפייה בדף הארגון של Sodot, גרפיקה

    730 עוקבים

    Exchange API Keys: The new attack vector in this bull market? Read more 🔒👇

    צפייה בפרופיל של Matan Hamilis, גרפיקה

    Co-Founder & Head of Research @ Sodot | Cryptography PhD student

    𝗞𝗲𝘆 𝗗𝗶𝗳𝗳𝗲𝗿𝗲𝗻𝗰𝗲𝘀 𝗶𝗻 𝗖𝗿𝘆𝗽𝘁𝗼 𝗘𝘅𝗰𝗵𝗮𝗻𝗴𝗲 𝗔𝗣𝗜 𝗞𝗲𝘆𝘀 API keys power automated crypto trading, but a lack of consistent management practices across exchanges like Coinbase, Binance and Kraken Digital Asset Exchange expose users to some security risks. Just to mention a few key differences: 🔑 𝗣𝗲𝗿𝗺𝗶𝘀𝘀𝗶𝗼𝗻𝘀: While some exchanges allow for granular, fine-grained control, others allow IP whitelisting and only part of exchanges allow for permission set grouping. 🔒 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗙𝗲𝗮𝘁𝘂𝗿𝗲𝘀: A majority of exchanges allow for 2FA, but the exact second factor (authenticator app / passkey / SMS) greatly differs across exchanges. Alerts, fine-grained logging inspection tools, and proactive alerts’ presence is also partial. 𝗧𝗵𝗲 𝗘𝘅𝗰𝗵𝗮𝗻𝗴𝗲 𝗔𝗣𝗜 𝗞𝗲𝘆 𝘁𝗶𝗺𝗲 𝗯𝗼𝗺𝗯 𝗶𝘀 𝘁𝗶𝗰𝗸𝗶𝗻𝗴 𝗮𝗻𝗱 𝗜 𝗰𝗮𝗻 𝗰𝗹𝗲𝗮𝗿𝗹𝘆 𝘀𝗲𝗲 𝘁𝗵𝗶𝘀 𝗮𝘀 𝗮 𝗳𝗲𝗿𝘁𝗶𝗹𝗲 𝗴𝗿𝗼𝘂𝗻𝗱 𝗳𝗼𝗿 𝗶𝗻𝗻𝗼𝘃𝗮𝘁𝗶𝗼𝗻, 𝗲𝘀𝗽𝗲𝗰𝗶𝗮𝗹𝗹𝘆 𝗶𝗻 𝘁𝗵𝗲 𝗽𝗿𝗲𝘀𝗲𝗻𝘁 𝗯𝘂𝗹𝗹 𝗿𝘂𝗻. Keep your keys close and manage your risks appropriately!

  • צפייה בדף הארגון של Sodot, גרפיקה

    730 עוקבים

    AI Agents in Web3: The Occasional Hype or a Potential Game Changer? 👇

    צפייה בפרופיל של Shalev Keren, גרפיקה

    Co-Founder and CTO @ Sodot

    𝗧𝗵𝗲𝗿𝗲’𝘀 𝗮 𝘁𝗼𝗻 𝗼𝗳 𝗵𝘆𝗽𝗲 𝗮𝗿𝗼𝘂𝗻𝗱 𝗔𝗜 𝗮𝗴𝗲𝗻𝘁𝘀 𝘅 𝗰𝗿𝘆𝗽𝘁𝗼—𝘄𝗵𝘆? Over the next few weeks I’ll attempt to break this down, today let’s talk about the basic synergy between crypto and AI agents: AI agents are on the rise and have the potential to revolutionize how the internet operates. Here’s the big idea: • Replace today’s server-driven APIs and web content with 𝘀𝗽𝗲𝗰𝗶𝗮𝗹𝗶𝘇𝗲𝗱 𝗔𝗜 𝗮𝗴𝗲𝗻𝘁𝘀, each mastering specific tasks with precision. • This approach solves key limitations of LLMs, like small context windows, making interactions smarter and more efficient. • For seamless interaction, AI agents need 𝗮𝘂𝘁𝗼𝗺𝗮𝘁𝗲𝗱 𝗽𝗮𝘆𝗺𝗲𝗻𝘁 𝘀𝘆𝘀𝘁𝗲𝗺𝘀 to handle real-time transactions. Enter 𝘀𝘁𝗮𝗯𝗹𝗲𝗰𝗼𝗶𝗻𝘀: • Already transforming cross-border payments and ecommerce payouts. • Perfectly positioned to enable 𝗮𝗴𝗲𝗻𝘁-𝘁𝗼-𝗮𝗴𝗲𝗻𝘁 𝗽𝗮𝘆𝗺𝗲𝗻𝘁𝘀—fast, seamless, and reliable. As AI agents evolve, stablecoins could become the backbone of their transactional ecosystem. The synergy between AI and crypto isn’t just hype—it could shape the future of intelligent automation. What do you think?

    • אין תיאור טקסט חלופי לתמונה הזו
  • צפייה בדף הארגון של Sodot, גרפיקה

    730 עוקבים

    𝗪𝗮𝗹𝗹𝗲𝘁 𝘄𝗶𝘁𝗵 𝗲𝗻𝘁𝗲𝗿𝗽𝗿𝗶𝘀𝗲-𝗴𝗿𝗮𝗱𝗲 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗰𝗿𝗲𝗮𝘁𝗲𝗱 𝗶𝗻 <𝟭𝟬 𝘀𝗲𝗰𝗼𝗻𝗱𝘀 🤯 A major pain point for wallet providers is to meet consumers' expectations of lightning-fast experiences and top security. The combination of 𝗠𝗣𝗖 + 𝗣𝗮𝘀𝘀𝗸𝗲𝘆𝘀 elegantly solves that. By integrating MPC with Passkeys, consumers enjoy several advantages: 1️⃣ 𝗘𝗻𝗵𝗮𝗻𝗰𝗲𝗱 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆: MPC eliminates the option for key loss or theft, while Passkeys eliminate reliance on passwords. 2️⃣ 𝗦𝗲𝗮𝗺𝗹𝗲𝘀𝘀 𝗨𝗫: Getting rid of seed phrases with MPC, and Passkeys' biometric authentication creates a delightful UX that dramatically boosts onboarding conversion rates. 3️⃣ 𝗡𝗮𝘁𝗶𝘃𝗲 𝗖𝗿𝗼𝘀𝘀-𝗣𝗹𝗮𝘁𝗳𝗼𝗿𝗺 𝗔𝗰𝗰𝗲𝘀𝘀: Passkeys enable smooth multi-device authentication, with MPC securely syncing key shares across devices. 👉 Learn more about MPC & Passkeys in our latest blog— https://lnkd.in/dRDj7_QU

    • אין תיאור טקסט חלופי לתמונה הזו
  • Sodot פרסם מחדש את זה

    צפייה בפרופיל של Ido Sofer, גרפיקה

    Co-Founder & CEO @ Sodot

    𝗠&𝗔𝘀 𝗶𝗻 𝗪𝗲𝗯𝟯 𝗧𝗮𝗸𝗲 𝗢𝗳𝗳 𝗮𝘀 𝗥𝗲𝗴𝘂𝗹𝗮𝘁𝗼𝗿𝘆 𝗖𝗹𝗮𝗿𝗶𝘁𝘆 𝗘𝗺𝗲𝗿𝗴𝗲𝘀 Without regulatory clarity, companies struggle to estimate the ROI of new business opportunities. This has been the case for Web3 over the past two years. However, in areas where regulatory clarity is now emerging, M&A activity in Web3 is picking up: 1. 𝗘𝘂𝗿𝗼𝗽𝗲 – From Robinhood acquiring Bitstamp to Paxos acquiring Membrane Finance. Expansion into European markets through M&As has accelerated since MiCA defined clearer rules. 2. 𝗦𝘁𝗮𝗯𝗹𝗲𝗰𝗼𝗶𝗻𝘀 – Stripe's acquisition of Bridge seems to mark the beginning of an all-out stablecoin arms race, impacting the infrastructure of the regulated payments sector. 𝗪𝗵𝗶𝗰𝗵 𝗮𝗿𝗲𝗮𝘀 𝗮𝗿𝗲 𝗻𝗲𝘅𝘁?

  • צפייה בדף הארגון של Sodot, גרפיקה

    730 עוקבים

    𝗣𝗿𝗶𝘃𝗮𝘁𝗲 𝗸𝗲𝘆 𝗰𝗼𝗺𝗽𝗿𝗼𝗺𝗶𝘀𝗲𝘀 𝘄𝗲𝗿𝗲 𝗿𝗲𝘀𝗽𝗼𝗻𝘀𝗶𝗯𝗹𝗲 𝗳𝗼𝗿 𝗼𝘃𝗲𝗿 $𝟯𝟮𝟰𝗠 𝘀𝘁𝗼𝗹𝗲𝗻 𝗶𝗻 𝗤𝟯 𝗮𝗹𝗼𝗻𝗲 (CertiK - HACK3D Q3 REPORT) 🚨  As the bull market gains momentum, the risks for Web3 wallets and custodians are skyrocketing. Last quarter, more than $320M was stolen due to private key compromises in 10 separate incidents. Private key compromises are lethal, as Certik explains in the report: “This type of breach is particularly damaging because there is no way to reverse the transaction, leaving users with little to no recourse once their assets are stolen.” Upgrade your key security today! Schedule a call with our security experts. https://lnkd.in/dnTpyJ9d

    • אין תיאור טקסט חלופי לתמונה הזו

דפים דומים

מימון

Sodot 1 total round

סיבוב אחרון

זרע

‏3,000,000.00 $

ראה מידע נוסף על crunchbase