dWallet Network is now Pera!

Trust Nothing.
Verify Everything.

The zero trust interoperability platform that allows protocols to operate across all chains while preserving users' self custody - so no user assets are at risk.

Our Partners

Introducing ZTPs

Bringing Back User Sovereignty to a Multi-Chain World

Zero Trust Protocols, or ZTPs, are a new type of Web3 protocol. A ZTP operates across multiple networks without requiring the user to trust third parties, like cross-chain solutions do. At the core of ZTP architecture is the dWallet, empowering developers to build ZTPs where user participation is cryptographically verified.

Cryptographic Verification

User participation is cryptographically required in every signature generated by a dWallet

Zero Trust Protocol slide image 2

No Trusted Parties

Users are not required to give away ownership of their assets to validators or anyone else

Zero Trust Protocol slide image 1

User-Controlled Security

ZTPs cannot unilaterally control a user’s assets without the user, so neither can malicious actors

Web3
=
Zero Trust

As Web3 evolved, networks with their own "zones of sovereignty" emerged, allowing protocols to inherit their Zero Trust architecture.

Traditional solutions operating across networks rely on third parties, turning Zero Trust Protocols (ZTPs) into Castle-and-Moat Protocols (CMPs).

dWallets empower builders on L1s/L2s to develop ZTPs operating across networks.

dWallet - The First ZT Building Block

Pera introduces Zero Trust Protocols (ZTPs), a revolutionary solution to both the Sovereignty Problem and the Honeypot Problem. dWallets, our innovative cryptographic primitive, can be used by ZTPs to enforce logic on user-generated signatures for transactions on any network.

A Tool for
Web3 Builders

A dWallet isn't a user-facing app, it’s a building block empowering Web3 builders to develop ZTPs operating across different networks.

Cryptographic Proof of User Participation

A dWallet always requires the user to generate a signature, together with a threshold of validators of the massively decentralized Pera Network.

State-of-the-Art
Threshold ECDSA

2PC-MPC, the state-of-the-art threshold ECDSA scheme created by the Pera team, enables the first noncollusive scalable signing mechanism.

ZTPs Across Web3

With dWallets, builders can create ZTPs that operate across multiple networks while maintaining Zero Trust. The logic for what a dWallet signs is determined by the ZTP, and executed by a ⅔ threshold of the massively decentralized Pera Network - with user participation cryptographically enforced.

Zero Trust Security Across Networks

ZTPs use dWallet technology to interact with different Zones of Sovereignty without losing Zero Trust.

Zero Trust Control of dWallet Signatures

A dWallet has an address on every network, and ZTPs control the logic of whether a signature is generated.

Zero Trust Logic Deployed on L1s/L2s

A ZTP built on an L1/L2 can control a dWallet, and since the user is always required it retains the Zero Trust assumptions.

Use Cases

Decentralized Custody

Securely hold any asset across multiple blockchains, including Bitcoin, with permissionless access control.

Native Staking & Restaking

A simplified and universal shared security ZTP, allowing users to stake any asset to secure any protocol.

Native Atomic Swaps

Securely swap any native asset, including BTC, for any other native asset, without bridging or wrapping.

Native Multi-Chain Lending 

Leverage your native BTC, without losing ownership over it or having to trade it for a derivative.

dWallet Marketplace

Transfer ownership over an entire portfolio, including illiquid assets such as soulbound or locked tokens.

AI Agents Guardrails

Build AI agents operating across all of Web3, without requiring full control and ownership of users' assets.

Ready to build with us?

Read the docs and join the community on Discord.

Read Docs