Hi Safe Community,
I’m Truda, one of the many contributors from Keystone. Keystone is proud to be a member of the Safe Guardians Team.
Today, we are super excited to announce and roll out our latest Multi-Coin Firmware Version M-7.2. This update gives our QR code a boost and enables it to support the decoding of Multi-Signature transactions executed via Safe.
To celebrate the firmware upgrade, we are offering a 30% discount on all Keystone products to the Safe community until the 31st of October 2022.
Start shopping here and use the following code upon checkout: Safecommunity
With the rise in popularity and usage of Safe’s Multi-Sig wallet by various DAOs & protocols, the Keystone team decided to dedicate our time and resources to enhance support for Keystone users by including a functionality to decode the details of Safe’s Multi-Sig transactions.
Keystone users are now able to view key information such as Transaction ID, Addresses, Transaction Fee, Path etc. prior to signing and executing transactions on Safe. This increases security as users can now check and refrain themselves from signing any malicious transactions. See example below:
Keystone’s ethos and number one priority has always been to help boost security and eliminate all blind signing in the Web3 space. We turn complicated crypto transaction details into a human-readable format so users understand and have full transparency on transactions they are approving.
The team also constantly maintains an open-sourced smart contract metadata registry and welcomes everyone to leverage it to improve your product’s security level via our ABIs.
Keystone is currently fully integrated with the Safe Extension app. Integration with the Safe Mobile app will be completed by the end of October. We really hope to see more Safe users jump onboard the Keystone bandwagon. Feel free to send me a DM or drop by our Discord or Telegram if you have any questions.
Also, shout out to the Safe team for working tirelessly with us to help implement this feature.
Check out our Socials below: