GLOV Secure Logo

GLOV SSS: Mnemonic Shards

Clear and robust hardware protection for seed phrases

What is GLOV SSS?

GLOV SSS is an open-source hardware solution that protects BIP-39 seed phrases with Shamir Secret Sharing.

Your seed is split into shards. A single shard is useless on its own. Only the defined threshold can reconstruct the seed in a local offline environment.

Coming Soon 100% Offline Non-Custodial

Key Benefits

  • Seed protection with Shamir Secret Sharing
  • Flexible threshold model (e.g., 3 of 5)
  • Dedicated autonomous hardware device
  • Simple local interface with no cloud dependency
  • Encrypted HTTPS local access
  • BIP-39 compatible

Core Principles

Security First

Designed to reduce real-world risk and minimize exposure.

Offline First

Local operation without cloud dependency, so you keep end-to-end control.

Non-Custodial

You remain in control of your secrets. GLOV SSS is a tool, not an intermediary.

Zero External Dependency

No third-party service required for standard operation.

Readable & Auditable

Built to be understood, tested, and audited.

Key Rule: No sensitive data (seed, shards, keys) leaves your local environment.

How It Works

1
Enter Seed Phrase

Input your BIP-39 seed phrase on the offline device.

2
Set Threshold

Choose your protection model (for example, 3 of 5).

3
Generate Shards

The seed is split into shards with Shamir's algorithm.

4
Store Securely

Distribute shards across separate trusted locations.

Reconstruction

When recovery is needed, gather the minimum shard threshold. Reconstruction happens locally for immediate use.

Dedicated Hardware Platform

ESP32-S3 Hardware Image Coming Soon

GLOV SSS

Hardware Base
  • ESP32-S3 architecture
  • Integrated local interface
  • Autonomous operation
User Experience
  • Embedded display
  • Physical controls
  • Guided workflow
Built-in Security
  • Encrypted local access
  • Hardware hardening mechanisms
  • Controlled reset path
Local Network
  • Local WiFi AP
  • HTTPS only
  • No internet connectivity required

Security & Trust

  In-Memory Protection
  • • Local handling of sensitive data
  • • Minimal exposure window for secrets
  • • Defensive lifecycle approach
  • • Supervision mechanisms
  Secure Local Network
  • • Local access only
  • • HTTPS connection
  • • No mandatory cloud dependency
  • • HTTP disabled
  Controlled Operations
  • • Visibility on system state
  • • Logs adapted by mode
  • • Maintenance mode for diagnostics
  • • Monitoring of essential indicators
  Reliable Crypto Foundation
  • • Shamir Secret Sharing (SSS)
  • • BIP-39 compatibility
  • • Secure random generation
  • • No unnecessary secret persistence

Who is GLOV SSS For?

Crypto Holders

Protect seed phrases for long-term personal custody.

Businesses

Frame critical secret protection with a distributed approach.

Security Professionals

Implement stronger key-management procedures.

Privacy-Focused Users

Keep sensitive information offline and under control.

Frequently Asked Questions

GLOV SSS combines Shamir's mathematical robustness with a dedicated offline device. You reduce single points of failure while keeping control.

No. The interface is designed to stay simple with a guided workflow and clear instructions.

The model is built for resilience. With a 3-of-5 scheme, you can lose up to 2 shards and still recover with the remaining 3.

Yes, with BIP-39 seed phrases (12 or 24 words), covering most modern wallets.

Yes. The project is open-source and can be audited by the community and security professionals.

To protect the local session and reduce interception risk. The device enforces encrypted access.
Coming Soon

Strengthen Seed Protection

Discover GLOV SSS and build a more robust, calm, and fully controlled seed-backup strategy.

Have questions? Contact our team