Custody Modes

Three Custody Modes. Your Keys, Your Rules.

Choose the custody model that matches your organization's security posture and operational requirements. Switch modes as your needs evolve - your assets, your policies, and your audit history carry over seamlessly.

Three modes

Choose the model that fits your operational requirements

Each mode provides the same policy evaluation, audit trails, and compliance tooling. The difference is where key shares are held and who participates in signing.

Full key control

Self-Custody

Your organization holds all key shares. No third party - including JIL - can sign transactions on your behalf. Compatible with hardware wallets and air-gapped signing devices.

Full private key ownership
Hardware wallet compatible (Ledger, Trezor)
Air-gapped signing support
No third-party dependency
Maximum sovereignty over assets
Ideal for organizations with dedicated security teams
Threshold signing with distributed trust

Split-Key (2-of-3 MPC)

Private keys are split into three shares distributed across your organization, the JIL platform, and an independent escrow agent. Any two of three shares are required to sign. No single party can act alone.

Key shares split across 3 parties
2-of-3 threshold signing required
Key ceremony for initial setup
Independent escrow agent
No single point of compromise
Recommended for most institutional deployments
Platform-managed signing

Delegated

JIL manages the signing process on your behalf, subject to your policy rules and approval workflows. Lowest operational overhead while maintaining full asset segregation and audit trails.

Platform manages signing operations
Full policy evaluation maintained
Approval workflows still required
Assets remain segregated per entity
Complete audit trail preserved
Ideal for organizations prioritizing speed of deployment
Key ceremony

Four-step key ceremony process

Every MPC deployment begins with a structured key ceremony. This process generates, distributes, verifies, and activates key shares in a way that produces cryptographic proof of correct setup.

01

Generate

Cryptographic key material is generated in a secure, isolated environment using a hardware random number generator. The generation process produces verifiable entropy proofs.

02

Distribute

Key shares are encrypted and distributed to designated share holders - your organization, the JIL platform, and the independent escrow agent. Each share is transmitted through a separate secure channel.

03

Verify

Each share holder independently verifies their key share using zero-knowledge proofs. Verification confirms that shares are valid and that the threshold scheme is correctly configured without revealing any key material.

04

Activate

Once all parties confirm successful verification, the key is activated for signing operations. A ceremony receipt containing all proofs and attestations is generated for your records.

MPC architecture

How key shards work together

Multi-party computation allows multiple parties to jointly compute a signature without any single party ever reconstructing the full private key. The key never exists in one place.

Client shard

Held by your organization. Stored in your HSM or hardware wallet.

Platform shard

Held by JIL. Stored in a FIPS 140-2 Level 3 certified HSM.

Escrow shard

Held by independent escrow agent. Accessible only during recovery.

Threshold signing requirement
2 of 3 shards required to sign

Any combination of two share holders can produce a valid signature. The full private key is never reconstructed - computation happens across the distributed shares using secure multi-party protocols.

01

Transaction initiated

A user submits a transaction request. The request passes through policy checks and approval workflows before reaching the signing layer.

02

Distributed computation

Each participating share holder contributes their partial signature using their key shard. Computation happens locally - shards are never transmitted.

03

Signature assembled

Partial signatures are combined into a single valid transaction signature. The transaction is broadcast to the network with a full audit receipt.

Legal positioning

JIL is a software platform, not a custodian

Your keys remain under your control. JIL provides the infrastructure - policy evaluation and attestation, audit trails, compliance tooling, and operational dashboards - but does not take custody of your assets. This structural distinction has significant legal and regulatory implications.

Assets exist outside the JIL balance sheet at all times
Platform insolvency does not affect your holdings
No custodial registration requirements in most jurisdictions
Reduced counterparty risk by design, not by contract
Full key recovery independent of platform availability

Traditional custodian model

Your assets sit on the custodian's balance sheet. You depend on the custodian's solvency, security practices, and regulatory compliance. Counterparty risk is structural.

JIL platform model

Your assets remain under your cryptographic control. JIL provides operational infrastructure but never holds, controls, or has unilateral access to your funds. Zero counterparty risk.

Explore the architecture behind the custody modes

See how the policy engine, approval workflows, and audit infrastructure work across all three custody modes - or start a pilot to evaluate the platform with your own requirements.