Kyte User Guide
Split to protect. Distributed to last. Never lose access again.
Kyte is a desktop application that protects your cryptocurrency seed phrase by eliminating its single point of failure. Instead of storing your seed in one place. Kyte uses Shamir secret sharing to split it into multiple fragments, only a subset of which is needed to recover the original. Guardian users can add an extra layer of AES-256-GCM encryption with a passphrase before splitting, so that even recovering enough fragments is not sufficient without the passphrase. Everything runs locally on your machine, no accounts, no cloud sync, no data ever leaves your device during encryption or decryption. Kyte provides the tools, you own the information, and we keep the zero-knowledge philosophy. Because when it comes to your recovery phrase, total control is the only standard that matters.
The Problem with Traditional Seed Storage
Most crypto users store their seed phrase in one of these ways:
Written on paper in a safe
Saved in a password manager
Engraved on a metal plate
Stored in an encrypted file
Each approach has a fundamental weakness: a single point of failure. One theft, one fire, one forgotten password and access is permanently lost.
How Kyte Works
Free Tier (Community Mode)
In Community mode, Kyte protects your seed using Shamir secret sharing alone, no passphrase is involved.
No passphrase is used in free mode. Shamir secret sharing alone protects your seed. An attacker must obtain at least 2 fragments to recover anything.
Guardian Mode
Telegram Alert
You can also enable Telegram Recovery Alerts during encryption. To prevent any unauthorized modification or false alarms by third parties, your bot configuration is stored exclusively on the local machine used for encryption. In the event of a recovery or a failed attempt, an immediate alert is sent to your trusted contacts, including the decryption IP address, allowing them to follow your instructions and alert the authorities if necessary. See Telegram Recovery Alerts for setup instructions.
Information-theoretic security: A single fragment reveals absolutely zero information about your seed. This is not just computationally hard to break, it is mathematically impossible. You need at least the threshold number of fragments to learn anything.
This means:
Losing one fragment does not lock you out (as long as you still have the threshold)
An attacker finding one fragment gains nothing
You can distribute fragments across different locations and trusted people
Free vs Guardian Tiers
Encryptions
1
10
Passphrase (AES-256-GCM)
No
Yes
Fragment count
Fixed 3
3–10 (configurable)
Recovery threshold
Fixed 2-of-3
Configurable 2–N
Telegram recovery alerts
No
Yes
Licence key required
No
Yes
Important Notes
This key is for single-use only. It cannot be transferred to another device or reused if the app is uninstalled and reinstalled.
Recovering Your Seed
Collect Your Fragments
Gather at least the threshold number of fragments (e.g. any 2 of 3 for the default configuration). Scan the QR codes (you can do it on your desktop) or copy the fragment text strings.
The recovered seed auto-clears after 30 seconds as a security precaution. Make sure you are ready to use or store it before starting recovery.
Recovery Scenarios (default 2-of-3)
To recover your seed, combine any 2 of the 3 fragments:
Fragment A + Fragment B → ✅ Works
Fragment A + Fragment C → ✅ Works
Fragment B + Fragment C → ✅ Works
Only 1 fragment alone → ❌ Not enough
Fragment Distribution Strategy
Each fragment should be stored separately in a different physical location or with a different trusted person. Never store two fragments together, that would recreate a single point of failure.

Each fragment label (A, B, C…) corresponds to a QR code card in the app. The label printed on the card tells you which fragment it is.
Guardian Tier Features
Passphrase Encryption
Guardian mode adds AES-256-GCM encryption on top of Shamir splitting. Your seed is encrypted before it is split, so fragments alone are not enough to recover the original.
Recovery requires: any threshold fragments + the passphrase you used during encryption.
If you lose your passphrase, your fragments alone cannot recover your seed. There is no passphrase reset or recovery mechanism. Store your passphrase safely and separately from your fragments.
Technical details:
AES-256-GCM authenticated encryption
PBKDF2-SHA512 key derivation (210,000 iterations - OWASP 2023 recommendation)
64-byte random salt per encryption
16-byte random IV per encryption
Custom M-of-N Configuration
Guardian users can configure the total number of fragments and the recovery threshold independently.
2-of-3
2
1
Default - simple personal use
3-of-5
3
2
Personal use with extra redundancy
5-of-10
5
5
Institutional or multi-party custody
2-of-4
2
2
Balance of security and flexibility
Higher threshold = an attacker needs more fragments to reconstruct your seed (more secure).
Higher total fragments = you can afford to lose more fragments without losing access (more redundant).
Choose based on how many trusted locations or people you have available, and how concerned you are about an attacker obtaining multiple fragments.
Telegram Recovery Alerts
Guardian users can receive an automatic Telegram message every time their seed is recovered. This acts as a tamper alert, if you get a notification you did not initiate, you know your fragments may be compromised.
Setup
Enable the "Telegram notification on recovery" toggle in the encrypt form.
Enter your bot token (format:
12345:ABCdef..., obtained from @BotFather on Telegram).Open Telegram application then search for
@BotFatherClick Start then type
/newbotand hit SendFollow the instruction until we get message with your bot token (
63xxxxxx71:AAFoxxxxn0hwA-2TVSxxxNf4c) like so:
Search and open your new Telegram bot on your Telegram app
Click Start or send a message
Open this URL in a browser
https://api.telegram.org/bot{our_bot_token}/getUpdateshttps://api.telegram.org/bot63xxxxxx71:AAFoxxxxn0hwA-2TVSxxxNf4c/getUpdates
You should see something like :
Check the value of
result.0.message.chat.id, and here is your Chat ID:21xxxxx38Enter your bot token (
63xxxxxx71:AAFoxxxxn0hwA-2TVSxxxNf4c) and chat ID (21xxxxx38) in Kyte Application.Optionally click "Test Alert" to verify your configuration before encrypting. The app shows sending / success / error states.
Click Encrypt. Your alert config is stored encrypted on your device.
What the Alert Contains
When your seed is recovered, you receive a Telegram message with:
Approximate city, region, and country (based on IP address)
ISP / network provider name
Google Maps link for the approximate coordinates
UTC timestamp of the recovery event
A disclaimer that the location is IP-based, not GPS
Important Notes
The alert is asynchronous. Your recovered seed appears in the app immediately. The Telegram message fires in the background after the seed is returned. There is no delay on the recovery side.
Location is approximate. The geolocation is IP-based and may reflect your ISP's routing center rather than your exact physical location. It is useful as an indicator, not a precise tracker.
Seed Phrase Requirements
Kyte validates seeds against the BIP39 standard:
12, 15, 18, 21, or 24 words - other lengths are rejected
BIP39 English wordlist - all words must come from the standard 2048-word list
Valid checksum - the last word encodes verification data; an invalid checksum is rejected
Kyte also normalizes input automatically:
Extra spaces are trimmed
Uppercase letters are converted to lowercase
You do not need to clean up your input manually.
Security Highlights
All operations run locally. Encryption and decryption never require an internet connection. No seed or fragment data leaves your device.
Your passphrase is never stored. Only you know it. If lost, it cannot be recovered.
Licence key and Telegram config are stored encrypted on your device using your OS's secure storage (Electron
safeStorage). They are never transmitted to any server.A unique backup ID ties all fragments together. Each set of fragments gets a random backup ID embedded at encryption time. If you accidentally mix fragments from two different encryption runs, Kyte detects the mismatch and rejects the combination.
The recovered seed auto-clears after 30 seconds to limit the window of exposure if you step away from your screen.
Getting Started
Your crypto security should not depend on a single point of failure. With Kyte, it does not have to.
Light, resilient, and elegant in its simplicity. That's Kyte.
Last updated