Crypto Security Firm Dfns Adds Biometric Support to Wallet Development Toolkit
The addition will allow wallet developers to incorporate Face ID, fingerprints, and other convenient authentication methods into their products.

Paris-based crypto security firm Dfns has revealed plans to incorporate biometric identification into its wallet-as-a-service toolkit, allowing crypto developers to build out wallets that use Face ID, fingerprint scanners and other biometrics to secure user funds.
Last year's collapse of the FTX exchange and numerous similar incidents reinforced that storing crypto in a personal wallet, rather than entrusting it to an exchange or custodian, is the safest option.
Yet many people continue to store their funds with companies like Coinbase and Binance. The reason? Crypto wallets can be inconvenient to use, often including private keys consisting of long strings of letters and numbers.
According to Clarisse Hagège, CEO of Dfns, which has raised $15 million of funding: "The first place a new user may start their Web3 journey is by opening a wallet, and if the UX feels foreign, cumbersome, or unfamiliar, the likelihood of conversion and retention drops precipitously.” UX stands for “user interface.”
Dfns is looking to change the dynamic by integrating biometric authentication into its wallet suite, aiming to assist developers in crafting more user-friendly wallets. "The beauty of using biometrics here is that it is extremely efficient in terms of UX,” Hagège told CoinDesk.
The biometric feature relies on the open-source WebAuthn standard, allowing users to authenticate themselves without directly sharing their biometric data with third parties.
"Everything is saved on the phone," Hagège said.
Adding biometric support to crypto wallets might be a new trend. Coinbase, the exchange and wallet provider, has said it plans to add the feature to its wallet-as-a-service suite.
Hagège argues the Dfns setup fundamentally differs from that of Coinbase and other wallet services. Coinbase and other companies tend to use something called multi-party computation (MPC) to secure private keys – a clever technique that allows wallet providers to manage a user’s private key without having complete access to it.
Dfns uses MPC in combination with a different technique, called "delegated signing," to achieve the same end. This method splits the key across a distributed network of nodes, rather than between a single user and a service provider. According to Hagège, the method makes wallets more secure, less vulnerable to downtime and more regulatory-friendly.
CORRECTION (May 9, 2023 15:20 UTC): The article has been updated to clarify that Dfns uses MPC and delegated signing in combination, not one or the other.
More For You
Protocol Research: GoPlus Security

What to know:
- As of October 2025, GoPlus has generated $4.7M in total revenue across its product lines. The GoPlus App is the primary revenue driver, contributing $2.5M (approx. 53%), followed by the SafeToken Protocol at $1.7M.
- GoPlus Intelligence's Token Security API averaged 717 million monthly calls year-to-date in 2025 , with a peak of nearly 1 billion calls in February 2025. Total blockchain-level requests, including transaction simulations, averaged an additional 350 million per month.
- Since its January 2025 launch , the $GPS token has registered over $5B in total spot volume and $10B in derivatives volume in 2025. Monthly spot volume peaked in March 2025 at over $1.1B , while derivatives volume peaked the same month at over $4B.
More For You
New React bug that can drain all your tokens is impacting 'thousands of' websites

Attackers are using the vulnerability to deploy malware and crypto-mining software, compromising server resources and potentially intercepting wallet interactions on crypto platforms.
What to know:
- A critical vulnerability in React Server Components, known as React2Shell, is being actively exploited, putting thousands of websites at risk, including crypto platforms.
- The flaw, CVE-2025-55182, allows remote code execution without authentication and affects React versions 19.0 through 19.2.0.
- Attackers are using the vulnerability to deploy malware and crypto-mining software, compromising server resources and potentially intercepting wallet interactions on crypto platforms.











