NFID Vaults Knowledge Base

NFID Vaults Knowledge Base

NFID Vaults is the only omni-chain smart wallet protocol on the web. People who want the most robust security for their assets use NFID Vaults to protect them from theft, loss, collusion, and fraud.

Our mission is to eliminate the risk of crypto loss. We took heavy inspiration from the brilliant teams at Safe and Fireblocks and applied them to the only decentralized network whose smart contracts are capable of securing assets on any chain: The Internet Computer Protocol.

On this page youโ€™ll find resources, guides, and education that will help you use NFID Vaults to protect and grow your crypto without the risk of loss.

If you have any questions, reach out via email at: or DM us on Twitter: @NFIDVaults.

Getting started with NFID Vaults

Create your NFID VaultCreate your NFID Vault๐Ÿ”Security recommendations

How to use NFID Vaults

๐Ÿง‘โ€๐Ÿš€Sign inDeposit and withdraw assetsDeposit and withdraw assets๐Ÿ†—Approve and reject transactions

Administrative actions

๐Ÿ’ฐManage wallet accounts๐Ÿ‘ฅManage members๐Ÿ’ผManage multi-factor security๐Ÿ‘‘Manage admin quorum thresholdโ›ฝTop up smart contract canister๐Ÿ’—Upgrade vault๐ŸŽฎEdit controllers๐Ÿ”„Clear queue


Explain how NFID Vaults is the most powerful self-sovereign smart contract wallet protocol on the web?

The statement consists of three parts:

  • Most powerful: Among other powerful features like reverse gas, speed, and cost, the most important for this product is that no other smart contract platform exists where the core NFID team can deploy omni-chain smart contract wallets (i.e. store native BTC, ETH, ICP, SOL, etc).
  • Self-sovereign: There is no other service on ICP (as of March 2024) that gives users full control of their own smart contract canister.
  • Smart contract wallet protocol: Finally, NFID Vaults is a protocol whose output is a smart contract wallet.
How can I verify how many vaults the NFID Vaults protocol has deployed, and how many assets the protocol is securing?

Find all information about protocol verification here.

Other resources

๐Ÿ’ผTerms of service๐ŸคจTrusted tokens