Skip to main content

What Developers Can Rely On

Identity-Anchored Access

Users access wallets through identity verification, not key management. Users do not need to manage keys or recovery mechanisms. You do not need to handle key recovery scenarios.

Deterministic Wallet Behavior

Transaction validation follows deterministic rules defined in smart contracts. Same inputs produce same validation results. Validation logic is publicly verifiable on-chain. Wallet behavior is consistent across all instances.

Identity-Backed Users (Without Identity Leakage)

Users have verified identity through UAE Pass. Your application does not receive personal identity data. You receive verification status, not identity data. You can build identity-aware features while respecting user privacy.