Proof-of-Reserves

Since 2020, CheckSig has been the first to offer public blockchain-based Proof-of-Reserves. Emulated by a few exchanges, we are still the only custodian to do so. Our unrivaled transparency ensures that all funds are always available and safe under our effective control.

Por

Transparent custody

At CheckSig, we believe in a provably-honest transparent custody. At least monthly, CheckSig executes a Proof-of-Reserves transaction, i.e., provides a proof that all bitcoins in custody are available and safely under our control.

This might seem so obvious to be redundant but, as a matter of fact, most crypto companies do not prove their reserves; woefully, they might be concealing losses to be discovered later on!

The public blockchain transaction

The Proof-of-Reserves is provided as a transaction, publicly verifiable on the Bitcoin blockchain.

    Such a transaction:

    • includes (i.e., in tech jargon, spends as TxIn) the amount under custody consolidated in the previous Proof-of-Reserves;
    • collects (i.e., spends as TxIn) all deposits CheckSig has received since the previous Proof-of-Reserves;
    • pays the transaction fees;
    • withdraws (i.e., creates a TxOut for) the amount required to satisfy our clients’ withdrawal requests, if any;
    • consolidates all remaining bitcoins as a single new amount (i.e., creates one change TxOut) at the consolidation address.

This new consolidated amount represents all bitcoins under custody at the transaction date.

Please note that spending the previous consolidated amount reveals the (pre-image of the P2WSH) locking-script that protects the bitcoins under custody, making CheckSig custody completely transparent.


Finally, the Proof-of-Reserves spends from and to the consolidation address in the same transaction to proves the control of the consolidated amount at the transaction date. While address reuse is bad for privacy, it is fine in our case because the Proof-of-Reserves must be public.

Moreover, residual security concerns (e.g., nonce exfiltration) are solved by our custody protocol. In fact, we rely on a multi-level multi-signature scheme using hardware wallets Hardware Security Modules from different vendors. To learn more about our security, read about CheckSig.

Open an account

With your account, you have access to all CheckSig services. Great services, at competitive rates.

Info

See the FAQs. For further questions or enquiries, our support is always available.

Share logo Share logo Share logo Share logo Share logo Share logo Share logo Share logo Share logo
CheckSig logo vertical

Login to the private area:

Swiss award

© CheckSig S.r.l. Società Benefit - P.IVA 11028330964 | CheckSig Suisse AG - CHE-183.628.610

PRIVACY POLICY COOKIE POLICY