Inabit Trusted Computing Wallet: Security Explained

Project Overview

Challenge: Create an educational explainer video that clearly illustrates the superior security of Inabit's Trusted Execution Environment (TEE) wallet solution compared to Multi-Party Computation (MPC) technology used by competitors.
Audience: Non-technical businesses looking to operate with cryptocurrency, including finance professionals (CFOs, accountants)

The Client's Challenge

Inabit approached us with a specific need: creating a visual explanation of their military-grade self-custody wallet solution that would effectively communicate complex cryptographic concepts to non-technical business audiences. Their platform differentiates itself through:

  • Self-custody wallet using TEE technology (vs competitors' MPC approach)
  • Decades-proven security protocols (vs relatively newer MPC implementations)
  • API accessibility for easy enterprise integration
  • User-friendly interface designed for traditional finance professionals

The key task was to explain why their approach provides true "self-custody" of crypto assets, addressing major security concerns of potential clients who often ask:

"Are the wallets secured?"
"Who can access the blockchain signing keys?"
"Can Inabit control the keys or have access to my wallets' funds in any way?"

Our Approach

As specialists in blockchain video production, we developed a comprehensive storyboard and script breaking down the complex technology into clear, sequential scenes that build understanding:

  1. Introduction to Inabit's solution - Establishing the wallet's purpose and security promise
  2. Private key fundamentals - Explaining the critical importance of key security
  3. TEE technology overview - Showcasing the hardware-based security approach
  4. Industry validation - Highlighting adoption by banks, defense organizations, and governments
  5. TEE's isolation mechanics - Visualizing how data remains protected
  6. Comparison with MPC - Contrasting with competitor approaches
  7. Infrastructure strength - Demonstrating Google and AMD partnership
  8. Registration process - Showing user experience during setup
  9. Transaction security - Illustrating the biometric authentication process
  10. Key generation system - Explaining the multi-layered key architecture
  11. Final security assurance - Reinforcing the unmatched protection

Results & Impact

The final explainer video provides Inabit with:

  • Clear differentiation from MPC-based competitor solutions
  • Simplified explanation of complex security architecture for non-technical audiences
  • Visual reassurance of the military-grade security measures
  • Educational resource for sales funnel and client onboarding
  • Self-service educational tool that reduces technical support requirements

The video serves as both a marketing asset and an educational piece that effectively addresses the primary security concerns of potential clients, supporting Inabit's goal of expanding their B2B customer base in the cryptocurrency space.

Credits

What’s a Rich Text element?

The rich text element allows you to create and format headings, paragraphs, blockquotes, images, and video all in one place instead of having to add and format them individually. Just double-click and easily create content.

Static and dynamic content editing

A rich text element can be used with static or dynamic content. For static content, just drop it into any page and begin editing. For dynamic content, add a rich text field to any collection and then connect a rich text element to that field in the settings panel. Voila!

How to customize formatting for each rich text

Headings, paragraphs, blockquotes, figures, images, and figure captions can all be styled after a class is added to the rich text element using the "When inside of" nested selector system.

asdasdsadsa asdas sad sD

Similar project case studies