Skip to main content

How is the Theya Key secured?

Joe Consorti avatar
Written by Joe Consorti
Updated over 2 weeks ago

The Theya Key is built with a layered security architecture to ensure your bitcoin is always protected. It combines strict app-level controls with hardened hardware infrastructure to deliver secure, limited-purpose co-signing.


1. App-Layer Security

  • The Theya Key is only capable of co-signing. It cannot initiate transactions on its own.

  • All transactions must be user-initiated, ensuring complete user control.

  • Any request that lacks valid user intent or authorization is automatically rejected.


2. Hardware-Layer Security

  • Keys are stored in distributed Hardware Security Modules (HSMs).

  • Offline backups are maintained to ensure recovery and redundancy.

  • Even in the event of a system compromise, signing is blocked unless strict security checks are passed at both the app and hardware level.


When can the Theya Key be used?

  • Theya will only co-sign transactions after the user completes a security questionnaire verifying identity and intent.

  • A mandatory 4-day waiting period is enforced before any co-signing can take place.

  • This delay provides time to detect and prevent unauthorized activity before funds can move.


The Theya Key is purpose-built for secure co-signing, not transaction initiation. With strong authentication, built-in delays, and secure key storage, Theya ensures your transactions remain protected and your funds always stay under your control.

Did this answer your question?