Meet SSP Wallet: Self-Custody With 2-of-2 Multisig

·6 min read·By SSP Team
SSP Wallet brand cover with the SSP logo, the 'GETTING-STARTED' category pill, and a 2x2 grid of self-custody icons.

If you have ever lost access to a crypto wallet — a missing recovery phrase, a hacked exchange account, a phone wiped before the seed was written down — you already know why self-custody is hard. The standard advice is "own your keys," but the standard tooling stops there: one phrase, one device, and a single point of failure that erases everything if it slips. SSP Wallet was built to remove that single point of failure without making the user do extra work.

SSP is a self-custody crypto wallet that pairs two devices into a 2-of-2 multisig setup by default. Every transaction is co-signed by your phone (the SSP Key app) and a second device (the SSP Wallet desktop or browser extension). Neither piece can move funds on its own. There is no recovery service in the middle, no shared seed, no off-chain account to compromise. This article is the short version of what SSP is, how the 2-of-2 model actually works, and what you need to do to start using it.

Self-custody without the usual tradeoffs

Self-custody traditionally forces a choice between two failure modes. Single-key wallets are simple but brittle — one phrase, one device, and if either is lost or copied, the funds are gone. Custodial accounts feel safe because someone else holds the keys, but every major exchange collapse of the last decade has shown what happens when that custodian is the wrong one. The compromise most people accept is to keep a small "hot" amount on a phone and a larger "cold" amount on a hardware wallet — two seed phrases to look after instead of one, and a stack of operational steps for any meaningful transaction.

Multisig has been around in Bitcoin scripts and Ethereum smart contracts for years, but it has historically been a power-user tool: command-line scripts, careful coordination, expensive on-chain setup costs, and a long list of ways to lock yourself out by accident. SSP takes the same security primitive — two independent signatures required for any spend — and wraps it in a flow that an ordinary user can follow on a phone in the time it takes to open a coffee. You get the resilience of multisig without the operational tax.

How 2-of-2 multisig works in SSP

At setup time, SSP generates two independent keys. One lives in the SSP Key app on your phone. The other lives in the SSP Wallet extension or desktop app on a second device. Each key is derived from its own seed phrase, generated on its own device. The two seeds are never combined, never transmitted, and never stored together. The wallet address you fund is derived from both public keys — not from either seed alone.

When you want to send a transaction, both devices have to sign it:

  1. You compose the transaction in the SSP Wallet app (the desktop or browser side).
  2. SSP Wallet signs it with its half of the keypair and pushes the half-signed transaction to your phone via the SSP Relay — an end-to-end encrypted, push-only channel. The relay never sees keys, only opaque payloads.
  3. The SSP Key app on your phone shows you what you are about to sign — the amount, the destination, the network. You approve. The phone adds its signature and broadcasts the fully-signed transaction.

The security guarantee is symmetric: an attacker who steals your phone cannot move funds, because they still need the desktop key. An attacker who compromises your laptop cannot move funds, because they still need the phone to confirm. Phishing a single device is no longer enough — the model assumes one half can be compromised and still keeps your funds safe.

Setting up SSP in five minutes

Most people are up and running on SSP in under five minutes. You install two pieces:

  1. SSP Wallet — either the browser extension for Chrome and Brave or the desktop app for macOS / Windows / Linux. This is where you initiate transactions and view balances.
  2. SSP Key — the companion app on iOS or Android. This is where you approve every spend.

The first time you open SSP Wallet it walks you through generating a new wallet and shows a QR code. Open SSP Key on your phone, scan the QR, and the two devices pair. Each one writes down its own seed phrase — store them separately, ideally in two different physical locations. From this point on, you sign every transaction by approving it on the phone.

If you already have a wallet on another platform and want to move funds in, you can. Your SSP-generated address takes any standard send from any exchange or other wallet. There is no migration step; the address is yours from the moment the two devices pair.

What SSP is not

It is worth being explicit about what SSP is not, because the wallet space is crowded with adjacent products that look similar but solve different problems.

SSP is not a custodial service. Nobody at SSP can move your funds, freeze your account, or reset your wallet for you. If you lose both seed phrases at once, there is no recovery; the math does not allow it. That is the same property that protects you from a server breach or a court order — and it is the price of holding your own keys.

SSP is not a hardware wallet replacement. A hardware wallet protects against malware on the host computer by keeping the signing key in a dedicated chip. SSP protects against a different threat — losing a single device, or one device being remotely compromised — by requiring two independent signers. The two approaches are complementary, and SSP Wallet supports Ledger as one of the two co-signers if you want both layers.

SSP is not a bridge, a swap aggregator, or a DEX. Those exist; SSP integrates with several through standard signing APIs. But the wallet's job is to hold your keys and sign what you tell it to sign — nothing more.

Where to go next

If you came in cold, the fastest path is to install both apps, pair them, and send a small test transaction to yourself before you fund the wallet for real. The Setup guide walks through that step by step, including how to back up each seed phrase safely.

If you already use another self-custody wallet and you are curious how SSP compares operationally, the multisig deep-dive covers the threat model in more depth — what attacks the 2-of-2 setup blocks, what it does not, and how to think about device hygiene over time.

Welcome to SSP. We will see you on the network.

Share this article

Related articles