Cross-app embedded
wallet infrastructure
Get more out of
your wallet provider
Capsule’s goal is simple: make transacting onchain easier. We handle the hard stuff for you, so you can get back to perfecting your product.
Easy User Onboarding
Move beyond seed phrases, manual signing, and browser extensions. Streamline user onboarding with recoverable, non-custodial wallets that match the look and feel of your application.
Wallet Portability
Embedded wallets without fragmentation. With a Capsule wallet, your users can single sign-on (SSO) across chains, devices, and apps – even if an application has not integrated Capsule yet.
Programmable Signing
Capsule makes transactions programmable. Control how and when transactions are executed with spending limits, progressive 2FA, and automations – all without increasing signing friction.
Customizations & Add‑Ons
Level up your end to end experience with native on and off ramps, analytics, and more. Build on Capsule's modal components or bring your own UI to suit your users’ needs and preferences.
Delightful Developer Experience
Capsule’s mobile and web SDKs are compatible with Ethers, Wagmi, Viem, and standards like EIP-1193 and ERC-4337, making integrating quick and easy.
Multi-Device Support
Whether you're building a mobile app, PWA, or Telegram bot, Capsule lets your users sign from anywhere. Manage user wallets across mobile, desktop, and more.
Intelligent Multi-Chain SSO
Completely abstract signing complexity across chains. Because Capsule wallets are compatible with all ECDSA chains, your users can single sign-on (SSO) across different chains.
Security first.
And second.
Capsule’s security model protects against both common and uncommon threat vectors, such as device loss and theft and more.
Learn MoreMulti-Party Computation
Capsule’s MPC uses Distributed Key Generation (DKG) and distributed signing mechanisms to ensure private keys are never stored in one place. Refresh and rotate keys on demand.
Passkeys
Capsule uses passkeys to leverage secure enclaves on user devices for keyshare storage. This limits browser-based key extraction attacks and decouples key access from authentication, ensuring that wallets are never compromised even if the social login is.
Transaction Permission Engine
Private keys cannot be accessed by your application, Capsule, or anyone but your users. Capsule’s permission engine offers wallet portability without trading off security.
Audits
What People are Saying
“We opted for Capsule for Welook and Stickers due to the outstanding team behind it and their solution for simplified web3 onboarding.
Unlike other options that seemed overly complex to implement, Capsule provides a more straightforward approach. It enables our users to sidestep the hassle of managing a seed phrase while still retaining self-custody through MPC.”
Ulises G.
CTO, Welook.io
“This collaboration aimed at safeguarding our users from the potential dangers associated with seed phrase vulnerabilities. The notable advantage of Capsule is that key management and your authentication method are independent of each other, thanks to passkeys. Working alongside the Capsule team has been an incredible experience for both the Fire team and our users.”
Josh Breite
Co-Founder, Fire
“Capsule is one of the most exciting projects in crypto Wallet as a Service (WaaS) because it has all the benefits with portability built in (the biggest problem of WaaS in my opinion).
Using the same keys to SSO across all applications and chains without having to bridge is one of the biggest crypto unlocks since L2s.”
Brian Flynn
CEO, Rabbithole
“The Capsule founding team brings genuine crypto OG credentials. Their deep expertise with MPC technology and ability to move fast truly distinguish them. With a mutual commitment to top-tier security and a shared vision for delivering highest quality user experiences, partnering with them was a clear choice.”
Social Login without the Liability
Secure keys with the best of both worlds - convenience of social login and the protection of passkeys. Keyshares are protected by secure hardware enclaves on users' physical devices.