Firefly replaced Trinity wallet on April 28th 2021. For the Trinity website click here.
Firefly guides you through the complexities of crypto, protected and with ease.
Firefly uses cutting edge Stronghold technology, so you don’t have to think much about security.
Firefly has a modular design that makes it easy to add innovative new features later on.
Not just a wallet app...
Profiles allow multiple people to securely use the app on the same device.
Your PIN allows you to open your wallet faster to check balances securely and easily.
With multiple Wallets you can separate and manage your funds with more flexibility.
Bringing the benefits of Chrysalis
Reusable addresses allow you to transact from a single address carefree, without accidentally risking your funds.
24 word recovery phrases - a highly secure and trusted seed phrase back-up.
Improved network performance. More reliable; less hassle. Faster than ever, with confirmation times measured in seconds.
Download security and feature updates without ever leaving the app
Network indicators inform you on the current health of the IOTA network.
Backup and security reminders
Save your wallet setup - make sure you don’t lose anything.
Built with security in mind
Under the hood, the wallet uses the latest advanced security, so that you don’t have to worry about it.
Written in Rust
Rust offers security from the ground up – while maintaining speed, low memory usage and scalability. This allows us to build apps with better performance and higher security.
Secured with Stronghold
Sensitive actions like address generation and transaction signing take place in isolated application memory, keeping the seed away from potential attackers.
Firefly separates different functionalities – like seed storage, handling transactions, and cryptography – in crates. A crate groups related functions, so that the functionality is easy to share between multiple projects.
Crypto.rs combines all cryptographic algorithms used by many of the projects at IOTA Foundation. It reduces the risk of using unsafe crypto implementations, making it easier to audit, resulting in verifiably safer code.