Every blockchain transaction requires cryptographic proof of ownership. This isn’t a feature that can be bypassed—it’s the mathematical foundation of the system. Without your private key, moving funds is as impossible as making 2+2=5.
How Private Keys Work
A private key is a 256-bit number with 115 quattuorvigintillion possible combinations.
It is generated and stored locally in your wallet (MetaMask, Ledger, etc.).
It is never transmitted to dApps.
It is the only way to authorize movement of your funds.
A seed phrase (also called mnemonic phrase) is a human-readable representation of the private key data. It encodes the private key through a standard algorithm (BIP-39). Saving the seed phrase securely ensures you can regenerate the private key in a new wallet if needed.
Think of it like DNA: unique, impossible to fake, and tied only to you.
What Happens When You Use Relay
Connection
You connect your wallet. Relay sees only your public address. Your private key stays encrypted.
Transaction Creation
You choose an action. Relay builds a transaction request. Your wallet shows you the details.
Signing
Your wallet uses your private key to create a digital signature, unique to that action. The key never leaves your wallet.
Execution
Relay broadcasts your signed transaction. The blockchain verifies the signature and executes.
Why Relay Cannot Steal Your Funds
No Private Key Access: Wallet software prevents any dApp from requesting your key.
Limited Permissions: A signature only authorizes the exact action you approved.
Security-First Design: Relay uses limited approvals. After each swap, permissions reset to zero. Even if compromised, only the approved swap amount could move.
Open Source Code: Relay contracts are public and verified. Malicious code would be visible immediately.
On-Chain Evidence: All transactions are permanent and traceable. Theft would be undeniable on-chain.
What Blockchain Evidence Shows
When funds are stolen:
ETH theft appears as a direct “transfer” signed with the victim’s key.
Token theft comes from either direct transfers or unlimited approvals with other protocols.
Relay’s limited approval system prevents this vector.
For example, this customer had their funds stolen in the following transaction.
Etherscan shows that the funds were a direct send 'From' their wallet: 0xa487F53300aeDd243eeFf3C0819b9D15d9AFecAE
This requires access to private keys, something Relay never has access to, or the ability to expose.
The Reality of Wallet Compromises
Claims that “Relay drained my wallet” always reveal:
The theft transaction was signed with the user’s key.
Attackers had access before Relay was used.
Bots waited for a deposit and struck automatically.
How Keys Actually Get Compromised
Phishing: Fake sites or impostor support collect seed phrases.
Malware: Keyloggers, clipboard monitors, and fake prompts capture sensitive data.
Fake Wallets: Trojan apps or cloned extensions transmit keys immediately.
Unsafe Storage: Notes apps, email, or screenshots expose keys.
SIM Swaps / Email Takeovers: Recovery methods tied to compromised accounts.
Malicious Approvals: Unlimited approvals on other protocols allow draining.
Hardware Risks: Fake devices or compromised setup computers can leak seeds.
Reused Seeds: One compromise exposes all linked wallets across chains.
What Attackers Do
They monitor compromised wallets. When you bridge funds and balances spike, bots trigger instant withdrawals. To the victim, it looks like the bridge caused the theft. In reality, the bridge only revealed the compromise.
The Blockchain Proves It
Every theft is signed with the victim’s private key.
Relay contracts are not involved.
The blockchain shows valid authorization, not exploits.
Conclusion
dApps cannot access private keys.
Transactions cannot execute without signatures.
Relay’s limited approvals eliminate draining risks.
Never share your seed phrase, even with trusted parties. Anyone with it can recreate your private key, sign transactions, and move your funds.
Your keys = your control.
No keys = no access.
Relay never has your keys = Relay cannot take your funds.
If funds disappear after bridging, it’s because the wallet was already compromised. The blockchain makes this truth visible every time.