Single-key wallets remain a single point of failure. Multi-signature (multisig) wallets solve this by requiring multiple approvals before any transaction executes.
If you’re considering cryptocurrency wallet development services, this article will walk you through the essentials of multi-signature wallets.
How Multisig Architecture Works
A multisig wallet operates on an M-of-N model, where M represents the minimum signatures required, and N is the total number of key holders. Common configurations include:
- 2-of-3: Three people hold keys; any two must approve. Ideal for small teams or personal security.
- 3-of-5: Five key holders; three approvals needed. Works well for medium-sized organizations.
- 4-of-7: The Ethereum Foundation uses this setup for their treasury.
- 5-of-9 or higher: Common for major DAOs managing substantial treasuries.
The process works like this: one key holder proposes a transaction. Other holders review and sign until the threshold is met. Only then does the transaction broadcast to the blockchain.
Platform-Specific Implementation
Different blockchains handle multisig differently:
| Blockchain | Method | Example Tool |
| Bitcoin | Pay-to-script-hash (P2SH) | Electrum, Coldcard |
| Ethereum | Smart contracts | Safe (formerly Gnosis Safe) |
| Multi-chain | MPC or smart contracts | BitGo, Liminal |
On Bitcoin, multisig uses native script functionality. The blockchain itself enforces the signature requirements. On Ethereum, it's implemented through smart contracts that can be upgraded and customized with additional features like spending limits and timelocks.
Safe (Gnosis Safe) dominates the Ethereum ecosystem. The platform secures billions in assets across DAOs, DeFi protocols, and institutional treasuries. Uniswap DAO manages over $2 billion using a 4-of-7 Safe configuration.
The Real Vulnerabilities
Multisig failures rarely come from cryptographic weaknesses. They result from operational gaps.
The Radiant Capital Hack (October 2024): Attackers compromised three private keys from an 11-signer setup and drained $53 million. A 3-of-11 threshold turned out to be too low for the total number of signers. Malware displayed legitimate transaction data in the Safe interface while sending malicious transactions to hardware wallets for signature.
Key lessons from the attack:
- The threshold was disproportionate (3 signatures controlling 11 signers' funds).
- Attackers exploited "blind signing" on hardware wallets.
- Normal transaction failure messages masked the attack.
- Post-hack, Radiant moved to 4-of-7. Still not ideal, but better.
Threshold Configuration Best Practices
The common recommendation is M = (N/2) + 1. But context plays a role:
For corporate treasuries:
- Use at least 3-of-5 minimum.
- Consider tiered thresholds: lower for routine operations, higher for large transfers.
- The geographic distribution of key holders reduces coordinated attack risk.
For DAOs:
- Higher thresholds (4-of-7 or 5-of-9) match decentralization values.
- Include timelocks for large transactions; 24-48 hours gives communities time to detect issues.
For individuals:
- 2-of-3 provides solid security without coordination overhead.
- Distribute keys across different hardware wallets from different manufacturers.
- Store one key with a trusted party or in a secure deposit box.
What to avoid:
- N-of-N configurations (one lost key = funds locked forever).
- Thresholds below 50% of signers.
- All signers are in the same geographic location or organization.
- Single device type or manufacturer for all hardware wallets.
Hardware and Software Security Layers
The signing environment matters as much as the configuration.
Hardware wallet requirements:
- Use dedicated devices; never sign on a primary work laptop.
- Diversify manufacturers (Ledger, Trezor, Coldcard) to prevent single-point firmware vulnerabilities.
- Newer devices with larger screens (like GridPlus) display fuller transaction data.
Verification protocols:
- Always verify transaction details on the hardware device screen.
- Check more than the first four characters of destination addresses; some attacks use similar-looking addresses.
- Use multiple independent communication channels for critical administrative actions.
Smart contract considerations:
- Audit the multisig contract code against the official repository.
- Enable monitoring tools like OpenZeppelin's Defender to alert on any contract activity.
- Implement timelocks using modules like Zodiac Delay Modifier.
Key Management and Recovery
Recovery planning separates professional operations from amateur setups:
- Store extended public keys (XPUBs), derivation paths, and M-of-N configuration separately from seed phrases.
- Seed phrases alone cannot recover a multisig wallet; you need the complete configuration.
- Test recovery procedures annually; software updates break compatibility more often than expected.
- Document the signing process clearly for all key holders.
Rotation and revocation:
- Establish procedures for removing compromised keys without fund migration.
- Plan succession for when key holders leave an organization.
- Consider time-locked inheritance setups for personal wallets.
Multisig vs. MPC: Understanding the Alternatives
Multi-party computation (MPC) wallets offer a different approach. Instead of multiple complete keys, MPC distributes fragments of a single private key across parties. No individual ever holds the complete key.
Multisig advantages:
- Full on-chain transparency and auditability.
- Proven track record with billions secured.
- Native blockchain support (especially Bitcoin).
- Simpler mental model for key holders.
MPC advantages:
- Lower transaction fees (single signature on-chain).
- Easier key rotation.
- Better privacy (single-key appearance on blockchain).
Some platforms now combine both approaches. BitGo and Fireblocks use MPC for key generation with multisig-like approval workflows. This hybrid model suits high-frequency institutional operations where gas costs are a concern.
Development Implementation Checklist
When building multisig wallet functionality into a cryptocurrency application:
- Choose architecture: Native script (Bitcoin) vs. smart contract (EVM chains) vs. MPC hybrid.
- Set appropriate thresholds: Match to organizational structure and fund value.
- Implement verification layers: Transaction simulation, multi-channel confirmation.
- Add monitoring: Real-time alerts on proposals, signatures, and ownership changes.
- Build recovery flows: Key rotation, threshold adjustment, emergency procedures.
- Test on testnets: Especially key loss and recovery scenarios.
- Document everything: Signing procedures, emergency contacts, recovery steps.
Conclusion
Multisig security protects the entire signing process. Operational security, threshold configuration, and hardware diversity matter more than adding more keys.
Editorial staff
Editorial staff