On December 4, CEX Wallet launched the Social Login feature, allowing users to create and access a self-custodial wallet using Google, Apple ID, or email, without ever needing to record or store a seed phrase. This feature is implemented based on TEE (Trusted Execution Environment on device), where the private key is generated, encrypted, and used within a hardware-isolated area, making it impossible to view, copy, or export. Wallet setup takes only a few seconds, and users can regain access by logging in again after switching devices, with all signing operations performed within the TEE. According to CEX Wallet, this solution is built on AWS Nitro Enclaves. Unlike approaches that rely on multi-party computation, TEE keeps all key operations on the local device, simplifying the recovery process while reducing system complexity. While there have been previous attempts at social login in the industry, solutions that combine TEE hardware isolation and achieve large-scale deployment on mobile are still rare.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
CEX Wallet supports login without mnemonic phrase
On December 4, CEX Wallet launched the Social Login feature, allowing users to create and access a self-custodial wallet using Google, Apple ID, or email, without ever needing to record or store a seed phrase. This feature is implemented based on TEE (Trusted Execution Environment on device), where the private key is generated, encrypted, and used within a hardware-isolated area, making it impossible to view, copy, or export. Wallet setup takes only a few seconds, and users can regain access by logging in again after switching devices, with all signing operations performed within the TEE. According to CEX Wallet, this solution is built on AWS Nitro Enclaves. Unlike approaches that rely on multi-party computation, TEE keeps all key operations on the local device, simplifying the recovery process while reducing system complexity. While there have been previous attempts at social login in the industry, solutions that combine TEE hardware isolation and achieve large-scale deployment on mobile are still rare.