
Unlock Autonomy for Wallets.User Data.Agents.Bridges.Vaults.Wallets.
Lit Protocol is the decentralized network for managing keys and secrets. Join the builders using programmable signing and encryption to power AI agents, blockchain interoperability, crypto wallets, and user-owned data.
Integrated with








Loading articles...

Securing the Decentralized World
$154M+
Total Value Managed
1.4M+
Total Wallets Managed
30M+
Data Points Decrypted

Agent Wallets
Universal Accounts For User Controlled Automation
Unlock true agent autonomy without sacrificing user control. Define exactly what agents can do through user-delegated permissions and policies enforced by Lit Actions.
- universal accounts for every chain and platform
- user authorization
- On-chain, open source tools
Interoperability
Program Private Keys
Break down blockchain silos with programmable private keys for seamless interoperability. Lit Actions allow you to embed immutable signing logic and condition checks directly into on and off chain apps.
- Automate cross-chain liquidity
- Build secure, programmable vaults
- Unify disparate Web3 and Web2 systems under a single, cryptographic control layer
User Owned Data
Private Data On The Open Web
Build applications where private data lives on the open web but remains verifiably under user control.
- Define exactly who can decrypt based on dynamic conditions
- Build user owned data and data marketplaces
- Put users in control
The Lit Network
Defense in Depth
Lit Protocol combines Threshold Multi-Party Computation (MPC) and Trusted Execution Environments (TEE) to secure keys with multiple layers of cryptographic protection. Secrets stay resilient—even if nodes or hardware are compromised.
Scalability
Deploy applications confidently on a globally distributed network. Lit Protocol's infrastructure scales horizontally, automatically meeting demand spikes without sacrificing security or performance.
Orchestrate Any Secret
Manage any private key, credential, or sensitive data across Web3, AI, cloud, and beyond. Lit Protocol's programmable signing and encryption let you securely automate interactions across every environment.
