Only this pageAll pages
Powered by GitBook
1 of 48

OISY Wallet

Introduction

Loading...

Loading...

Loading...

Using Oisy Wallet

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Integrate With OISY

Loading...

Loading...

Media

Loading...

Loading...

Press Releases

Loading...

For Developers

Loading...

Loading...

Loading...

Rewards

Loading...

Loading...

Loading...

Loading...

Security

Loading...

Loading...

Creating a Wallet

OISY Wallet is a fully on-chain, browser-based, multi-chain crypto wallet designed for seamless access to decentralized finance. Unlike traditional wallets that require browser extensions or downloads, OISY operates directly from your web browser, allowing for secure, passkey-enabled sign-ins with no reliance on third-party servers.

To create an OISY Wallet:

  1. Navigate to OISY.com.

  2. Click “Open or Create” to begin the setup process.

  3. On the Choose Identity screen, select “More Options".

  4. Enter your Internet Identity or select “Create New” if you do not yet have one.

  5. Follow the Internet Identity setup process:

  • Click “Create Passkey” and choose whether to create your passkey on your current device or another device.

  • Complete the CAPTCHA verification.

  • Your Internet Identity number will be displayed—this is your unique identifier for accessing OISY Wallet. Save it in a secure location.

  1. Once verified, your OISY Wallet will be generated and you will be redirected to the main wallet interface.

OISY Wallet is fully on-chain and powered by threshold ECDSA cryptography, ensuring secure key management across dedicated ICP nodes.

Create an Internet Identity

Setting up your Internet Identity is quick and secure. Follow these steps to get started:

1. Go to OISY.com.

2. Press “Open or Create.”

3. Select “Create Internet Identity.”

4. Choose your passkey security method (e.g., Face ID, fingerprint, or security key).

5. Complete the passkey setup flow.

6. Take note of your Internet Identity (a 7-digit number) displayed on the confirmation page—save it somewhere safe.

7. Press “I saved it, continue.”

8. You’ll be redirected to OISY Wallet, where your wallet will load automatically.

📌 Once completed, you’ll have seamless access to OISY and other ICP services.

Introduction

Learn about OISY Wallet and how to integrate with it.

OISY Wallet was incubated at DFINITY Foundation to simplify DeFi navigation. Initially built for ICP, it quickly evolved to unify primitives across all DeFi chains.

Today, OISY is the world’s first fully on-chain digital asset wallet, consolidating chains, identities, and primitives into a single immutable DeFi terminal.

Powered by ICP’s Chain Fusion technology, OISY delivers security, transparency, and scalability by default.

Internet Identity

OISY Wallet uses Internet Identity for authentication.

Internet Identity provides a secure, privacy-focused, and user-friendly authentication solution for the Internet Computer ecosystem. It allows users to securely and anonymously access decentralized applications (dapps) on the platform. Here are the key features of Internet Identity:

  1. Passwordless Authentication: Instead of traditional usernames and passwords, Internet Identity uses passkeys, which are cryptographic public/private key pairs. Users can authenticate using biometric methods like fingerprint sensors (TouchID) or facial recognition (FaceID), or hardware security modules like YubiKeys or Ledger wallets.

  2. Privacy-Enhancing: Internet Identity creates a unique pseudonym for each dapp a user authenticates with, preventing tracking across different applications and enhancing user privacy.

  3. Decentralized and Secure: It operates entirely on the Internet Computer blockchain, allowing users to verify the code it runs. This decentralized approach enhances security and transparency.

  4. User-Friendly: Users can create "identity anchors" and assign multiple devices to them, making it convenient to access dapps across different devices without managing complex cryptographic keys directly.

  5. No Personal Information Required: Unlike traditional authentication methods, Internet Identity does not collect or store any personal identifying information from users.

  6. WebAuthn Integration: Internet Identity is built on the WebAuthn API, which is supported by modern web browsers and operating systems, ensuring broad compatibility.

More information:

  1. Internet Identity explained

  2. Manage your Internet Identity

Why OISY Wallet

OISY Wallet is a fully on-chain solution that requires no downloads or installations. Explore the wallet’s features in detail below:

Digital Asset Management

OISY empowers you to manage all your digital assets—including Bitcoin, Ethereum, ICP, Solana and more—within a single, unified wallet. Say goodbye to the hassle of juggling multiple wallets for different cryptocurrencies. With OISY, you can enjoy a seamless, efficient experience that bridges the gap across various platforms.

Network Custody

OISY Wallet introduces network custody, a groundbreaking approach that leverages the Internet Computer’s advanced cryptography to eliminate the need for directly handling private keys. This innovative method offers a secure and user-friendly alternative to traditional practices, embodying the principles of the “Onchain is the New Online” movement. By operating on a distributed network, OISY enhances security and resilience against cyber threats.

Your multi-chain assets are safeguarded by a key that is neither controlled by a single entity nor has ever existed as a singular unit. Instead, this key is generated through advanced cryptography that distributes key-shares across dedicated ICP replica nodes, with signatures created using threshold ECDSA.

Fully On-Chain

OISY’s security extends beyond keys—the entire wallet application is fully stored on-chain and served directly to your browser via the Internet Computer. This architecture ensures the wallet adheres to a decentralized trust model, making it inherently tamper-proof and highly secure.

Regardless of your preferred browser or operating system, OISY enables you to seamlessly receive, hold, and send native ICP, ICRC-1, ETH, ERC-20, SOL, BTC, and many more tokens.

Limitless Access

Through Internet Identity, OISY allows you to access your wallet across all devices linked to your decentralized identity. Whether you’re using a smartphone, tablet, or desktop, you can enjoy a consistent and secure experience.

Multichain Compatibility

OISY integrates the WalletConnect protocol, enabling you to interact with a wide range of established Web3 services, such as Uniswap. Additionally, the OISY team is actively working to integrate ICP signer standards, paving the way for seamless interaction with ICP’s dApp ecosystem.

How To's

Jump to any How To you need. If you need a new How To, just hop into our discord and request it.

Onboarding

Using OISY Wallet

Hints

Help & Community

Creating a Wallet
Logging Into OISY
Create an Internet Identity
Find Your Internet Identity
Sending Tokens
Receiving Tokens
Managing & Adding Tokens
Swapping Tokens
Connecting to dApps
Saving OISY Web App to Your Device
Join the Tester Program
Raise a Support Ticket
Submit Feedback

Saving OISY Web App to Your Device

Adding OISY to your Phone

iOS (Safari)

1. Open Safari on your iPhone or iPad.

2. Navigate to OISY.com.

3. Tap the Share icon (square with an upward arrow) at the bottom center of the screen.

4. Scroll down and select ‘Add to Home Screen’.

5. A prompt will appear to name the app (default: OISY Wallet). You can keep or customize it.

6. Tap ‘Add’—the OISY Wallet icon will now appear on your home screen.


iOS (Firefox)

1. Open Firefox on your iPhone or iPad.

2. Navigate to OISY.com.

3. Tap the three lines in the bottom right corner.

4. Select ‘Share’ from the menu.

5. Tap ‘Add to Home Screen’.

6. Confirm or modify the default app name (OISY Wallet).

7. Tap ‘Add’—the OISY Wallet shortcut will now be available on your home screen.


Android (Chrome)

1. Open Chrome on your Android device.

2. Navigate to OISY.com.

3. Tap the three-dot menu in the top right corner of the screen.

4. Select ‘Add to Home screen’.

5. A prompt will appear to confirm installation—tap ‘Install’.

6. The OISY Wallet icon will now appear on your home screen.


Android (Brave)

1. Open Chrome on your Android device.

2. Navigate to OISY.com.

3. Tap the three-dot menu in the bottom right corner of the screen.

4. Select ‘Add to Home screen’.

5. A prompt will appear to confirm installation—tap ‘Install’.

6. The OISY Wallet icon will now appear on your home screen.


Android (Firefox)

1. Open Firefox on your Android device.

2. Navigate to OISY.com.

3. Tap the three-dot menu in the bottom right corner.

4. Select ‘Install’.

5. When prompted with ‘Add to Home Screen’, tap ‘Add’.

6. The OISY Wallet shortcut will now appear on your home screen.


Adding OISY to your Desktop

Apple (Safari)

  1. Open ‘Safari’ browser

  2. Navigate to OISY.com

  3. Press the Share button in the top right corner of the window

  4. Select ‘Add to Dock’

  5. Adjust the Icon, Name, and URL as you wish

  6. Press ‘Add’

  7. You can now go to your dock and move the ‘app’ where you’d prefer

Swapping Tokens

OISY Wallet features a built-in decentralized swap function, allowing users to exchange assets directly within the wallet.

To swap tokens:

  1. Click the “Swap” button below your available balance.

  2. Select the tokens you wish to swap in the “You Pay” and “You Receive” dropdown menus.

  3. Enter the amount for the swap.

  4. Adjust or confirm the Max Slippage Rate (if applicable).

  5. Click “Review Swap” to verify transaction details.

  6. If all values are correct, click “Swap Now” to complete the transaction.

Swaps are executed through on-chain liquidity pools, ensuring full decentralization and provable fairness.

Find Your Internet Identity

If you’ve used OISY Wallet before or logged in with Internet Identity, you can go to https://identity.ic0.app and see the identity number(s) used.


Finding Your Internet Identity After April 9, 2025

Starting April 9, 2025, the login flow will use a new domain: internetcomputer.org

This change enhances security and long-term reliability of the Internet Identity service. However, your previously saved identity may not appear automatically on the new login screen.

To find and use your existing II after the domain switch:

  1. Visit the original II portal at https://identity.ic0.app/.

  2. Your Internet Identities will be listed—identify the one associated with OISY.

  3. Write down the number, if you haven’t already.

  4. Go to OISY.com and initiate the login.

  5. The new identity modal will appear at https://identity.internetcomputer.org.

  6. Enter your saved Internet Identity number and complete the login using your preferred biometric method.

💡 Tip: If your Internet Identity still doesn’t show up in the new modal, re-check that you’re using the correct device and browser used during registration.

If you encounter any issues, reach out via our support ticket system—we’re happy to help.

Connecting to dApps

Via WalletConnect (Select Wallet)

1. Navigate to the dApp’s website (e.g., AltitudeFi ).

2. Click ‘Connect Wallet’.

3. Choose WalletConnect.

4. Search for and select OISY Wallet.

5. Approve the connection when prompted. ✅ Your OISY Wallet is now linked—ready to interact with DeFi protocols.

Via WalletConnect (QR Code/Enter Link)

1. Navigate to the dApp’s website

2. Click ‘Connect Wallet’.

3. Choose WalletConnect.

4. The site will populate a QR Code within the popup window.

5. Go to OISY Wallet on mobile (ensure you are logged in)

6. In the top right corner of the wallet press the wallet connect icon

7. Press 'Scan QR Code' or enter 'wallet connect link'

8. Approve the connection when prompted

✅ Your OISY Wallet is now linked—ready to trade, stake, and interact with DeFi protocols.


Via Internet Computer (ICP)

1. Open the dApp (e.g., Kongswap).

2. Click ‘Connect Wallet’ and select OISY Wallet.

3. In the pop-up, click ‘Open or Create’.

4. Choose your Internet Identity in the second pop-up.

5. Complete the Internet Identity sign-in flow.

6. A ‘Review Permissions’ page will appear—check details and approve.

7. A second permissions page will request transaction approval—approve to enable token transfers. ✅ Your wallet is now connected—trade, stake, and use dApps directly from OISY.

Getting started

Using OISY Wallet

Security

For Developers

Integrate With OISY Wallet

Media Kit

Logging Into OISY
Why OISY Wallet
Internet Identity
Receiving Tokens
Sending Tokens
Connecting to dApps
Best Practices
Build and Run Yourself
ICP Building Blocks
How to "Connect with OISY"
Logos & Assets
Media Kit
Cover
Cover
Cover
Cover
Cover
Cover

Logging Into OISY

Since OISY Wallet is browser-based, you can log in seamlessly without requiring a password. Instead, it leverages Internet Identity authentication, allowing you to use biometrics (FaceID, TouchID) or a security key.

To log in:

  1. Go to OISY.com.

  2. Click “Open or Create.”

  3. On the Choose Identity screen, select your Internet Identity.

  4. Complete the sign-in verification using your preferred method (FaceID, TouchID, or security key).

OISY Wallet offers cross-device access without the need for extensions, ensuring a frictionless experience across desktop and mobile browsers.

Sending Tokens

OISY Wallet supports seamless token transfers with zero reliance on centralized intermediaries.

To send tokens:

  1. Open your wallet and select the token you wish to send.

  2. Click the “Send” button.

  3. Enter the recipient’s wallet address or scan their QR code.

  4. Specify the amount you wish to send (or select “Max” to transfer all available tokens).

  5. Review the transaction details, including network fees.

  6. Confirm and submit the transaction.

Transactions are executed using threshold ECDSA cryptographic signatures, ensuring decentralized, verifiable security.

Migrating Wallets

If you’re moving your assets from another wallet to OISY Wallet, follow these steps carefully to ensure a smooth migration.

Step 1: Retrieve Your OISY Wallet Address

1. Open OISY Wallet at OISY.com.

2. Click ‘Receive’ on the main dashboard.

3. Select the blockchain network corresponding to the tokens you’re transferring.

4. Copy the wallet address displayed or scan the QR code.

📌 Make sure the selected network matches the tokens you’re migrating—sending assets to an incorrect network can result in loss.

Step 2: Send Assets from Your Existing Wallet

1. Open the wallet you are migrating from (e.g., Metamask, Phantom, NFID, or another crypto wallet).

2. Navigate to the ‘Send’ or ‘Transfer’ function.

3. Paste the OISY Wallet address you copied earlier in the recipient field.

4. Select the correct token and network for the transfer.

5. Enter the amount you want to send.

6. Double-check that all details are correct, then confirm and submit the transaction.

📌 Depending on the network, you may need to pay a gas fee to process the transfer. Fees vary by blockchain.

Step 3: Verify Assets in OISY Wallet

1. After sending, return to OISY Wallet.

2. Go to ‘Assets’ and check if the transferred tokens appear.

3. If the tokens do not show up immediately:

  • Wait a few minutes—some networks take longer to process transactions.

  • Click ‘Manage Tokens’ and search for the token.

  • If the token is missing, follow the steps in ‘Managing & Adding Tokens’ to manually import it.

📌 Blockchain congestion or network delays may impact how quickly your assets appear in OISY Wallet. If you experience delays, check the transaction status on a blockchain explorer (e.g., Etherscan, Solscan, or ICScan).

Important Notes on Migration

  • You may need to transfer tokens individually—some wallets do not support bulk transfers.

  • Certain wallets charge withdrawal fees, so check the cost before initiating a migration.

  • If you encounter issues, refer to ‘Managing & Adding Tokens’ or reach out to OISY Support for assistance.

✅ Once the transaction is complete, your assets will be available in OISY Wallet, and you can begin using them across supported dApps and DeFi protocols.

Filter & Manage Network

Filter Networks

Want to focus on one chain at a time? You can quickly filter your wallet view to only show tokens from a specific network.

Here’s how to do it:

  1. Head to the top right corner of your wallet interface.

  2. Click the dropdown labeled All Networks.

  3. Choose the network you’d like to view (e.g., Ethereum, ICP, Solana).

  4. Your wallet will automatically update to display only tokens from the selected chain.

Note: You can only view one network at a time.

  1. To reset your view and see everything again, just reopen the dropdown and select All Networks.

That’s it. One view, one chain, less noise.


Manage Networks

Prefer a cleaner view? You can also hide networks you don’t use and keep them hidden:

Here’s how to do it:

  1. Go to the left-hand menu and click on Settings.

  2. Navigate to the Networks section.

  3. Click Edit — a modal will appear with a list of networks and toggle switches.

  4. Toggle off the networks you don’t want to see (or toggle on ones you do).

  5. Press Save to update your settings.

Your wallet will now only show the networks you’ve chosen. Fewer distractions, smoother experience.

Generate Referral Link

Want to share the OISY Wallet love and earn a little extra along the way? With the Sprinkles reward program, you can generate a personal referral link and start getting rewarded when friends sign up.

Here’s how to get your referral link:

  1. Open OISY Wallet

  2. In the top right corner, click your profile dropdown

  3. Select Refer Your Friends

A modal will pop up with your personal referral QR code and link.

  1. Copy the link or save the QR code to share it with others

  2. Once someone creates a wallet using your link, the status message (“You haven’t referred anyone yet”) will update to reflect your referrals.

That’s it. Start sharing and watch your referral count grow.

Finding Tokens in Your Wallet

If a token does not automatically appear in your wallet, follow these steps to manage your assets:

  1. Click the “Manage Tokens” button at the bottom of your wallet interface.

  2. Select the tokens you wish to display.

  3. The selected tokens will now be visible in your wallet.

OISY Wallet automatically detects major assets, but users have full control over token visibility.

Managing & Adding Tokens

OISY Wallet supports a wide range of assets across multiple blockchains. If you don’t see a token in your asset list, follow these steps to manage and add tokens manually.

Step 1: Viewing Your Assets

1. Open OISY Wallet at OISY.com.

2. Click ‘Assets’ on the left-hand sidebar.

3. Standard assets should appear in the center of the screen.

📌 If your token is not visible, follow the steps below to manually add it.

Step 2: Searching for a Token

1. Scroll down and select ‘Manage List’.

2. Use the Search bar to look up the token by name or symbol.

3. If the token appears in the results, select it, and it will now display in your wallet.

📌 If the token is still missing, you may need to manually import it.

Step 3: Manually Adding a Token

If your token is not detected automatically, follow these steps to import it:

1. Click ‘+ Don’t see your token? Import’.

2. Select the correct blockchain network from the dropdown menu:

  • Ethereum → Enter the ERC-20 contract address.

  • Solana → Enter the SPL token address.

  • Internet Computer → Enter the Ledger Canister ID.

📌 The Index Canister ID is not required, but without it, you won’t see the token’s transaction history.*

3. Review the token details carefully:

  • Name

  • Network

  • Symbol

  • Contract Address

  1. If everything is correct, click ‘Add the Token’

  2. Your newly added token will now be visible in your wallet under the Assets tab.

Step 4: Troubleshooting Missing Tokens

If your token still doesn’t appear after importing:

  • Double-check that the contract address is correct (you can verify it on Etherscan, Solscan, or ICScan).

  • Ensure you selected the correct network—tokens on different chains require separate contract addresses.

  • If necessary, refresh your wallet or log out and back in to update the asset list.

📌 If you continue to have issues, please raise a support ticket.

Raise a Support Ticket

Raise a Support Ticket (In-App)

1. Open OISY Wallet.

2. Click your profile (top right).

3. Select ‘Support’.

4. Follow the steps to email support@oisy.com or use Discord.


Raise a Ticket (Discord)

1. Join OISY Discord.

2. Verify your account.

3. Navigate to ‘#📮・get-support’.

4. Click ‘Create Ticket’.

5. A private thread will open—post your issue.

Send a Token Using a dApp

This page describes how OISY users can send a token from their OISY Wallet using Uniswap. This can be helpful in an instance with OISY where sending a token fails.

Preface

If sending a token directly from OISY fails—due to a temporary bug, a third-party dependency, or a token-specific issue—you can still move your funds by connecting OISY to a supported DeFi dApp. Many apps, including Uniswap, allow users to send tokens directly through their interface.

This flow provides a reliable fallback. The example below uses Uniswap, but the same steps apply to other dApps that support WalletConnect.

Send a token using Uniswap

In general, sending a token from your wallet via an web application requires the following steps

  1. Open OISY and the application

  2. Connect OISY to the application

  3. Initiate the send in the application by selecting the token, the amount and the destination.

  4. Confirm the send in OISY. This step is important can can often be overlooked, resulting in thinking the send failed.

Note: This process works for tokens from all networks, but Uniswap only supports Ethereum / EVM based Networks (Ethereum, Base, BNB). For tokens from other networks, you can use a different Defi website and follow the same process:

  • For ICP / ICRC tokens, we recommend using KongSwap.

  • For Solana, Jupiter or Raydium are feasible options.

1. Open OISY and Uniswap

To initially connect and then confirm the send, you manually need to switch to OISY. So it's recommended to have both OISY and Uniswap open in 2 individual browser tabs. The Uniswap URL is: https://app.uniswap.org/

2. Connect OISY to Uniswap

OISY supports a standard method called WalletConnect to connect to DeFi applications. This part shows you step by step how to connect OISY to Uniswap via WalletConnect.

Important: Do not log in to Uniswap 'directly'. Only connect your OISY wallet through the flow described below.

Step 1 - Click "Connect" on top right of the Uniswap homepage

Step 2 - Click "Other Wallets" and then "WalletConnect"

Step 3 - Click "Copy link" on the appearing WalletConnect modal window If you don't see this QR code modal, press a blue QR code button on the appearing modal.

Step 4 - Paste the code in OISY

  • Switch to the OISY tab

  • click the WalletConnect Button on the upper right part

  • Paste the copied link into the field

  • and click Connect

Step 5 - And Confirm

All actions that WalletConnect wants to do with your OISY wallet must be confirmed by you. This keeps all your assets safe, and allows you to review all transactions before they take place.

Ensure that the displayed name & URL of the Proposer are the same as the one your are connected to.

Now you should see that the WalletConnect button in OISY changed into a "Disconnect" button, allowing you to close the connection anytime you want.

You can now switch back to Uniswap. There you should also see your OISY principal on top right instead of the Connect button.

3. Initiate the Send

Step 1 - Click on "Send"

Step 2 - Click on the Token to select the token you want to send.

Ensure to select the right Network first (dropdown in the upper right area of the modal). This allows you to see all tokens from that network that are in yourWallet. Then you can select the token you want to send.

Step 3 - Enter amount, destination, and hit send.

Hint: Like in OISY, you can switch between entering the USD value or the token amount directly by clicking the icon with the 2 arrows below the number field.

Step 4 - Confirm the transaction in Uniswap

4. Confirm the Send in OISY

This step is very important, and the send will not go through without it.

OISY does not allow an application to access your assets unchecked, so have to give consent to each individual transaction that attempts to withdraw assets from your wallet.

To do so, switch to the OISY tab where you should see a confirmation modal open, with the details of the transaction you just initiated.

Approve this modal, and the transaction will be executed.

Uniswap then shows you a notification that the transaction has been executed (takes a few seconds)

And you can then see the transaction appear in OISY (also after a few seconds)

Submit Feedback

Give Feedback

2. Go to ‘#💡・feedback’.

3. Share your thoughts.

4. A ✅ means your feedback has been logged.

Join the Tester Program

2. Verify your account.

3. When a test is announced, react with 🧪.

4. Get the ‘[α] Testers’ role.

5. Access private tester channels with instructions.

1. Join .

1. Join

OISY Discord
OISY Discord

Listing a Token on OISY

Listing your token with OISY is simple and straightforward. We only need your:

  • Ledger Canister ID

  • Index Canister ID

  • icrc1 logo must be a Data URL *

  • Token listed on CoinGecko **

* = Not Required, but preferred **= Not Required, but allows us to display token price

Join the OISY Discord server and share these details with us in the "# 🛠・dev-questions' Channel—more often than not, we can include your token in our next release.

Support

Whether you have a quick question, want to chat with the community, or need direct assistance, we’ve made it easy to find the help you need.

🔍 Frequently Asked Questions

Before reaching out, check our FAQs to find answers to common questions about our product, features, and troubleshooting steps.

💬 Join the Community on Discord

Connect with other users, get real-time support, and stay up to date with announcements in our Discord community.

Still need help? No worries! Reach out to our support team via email at support@oisy.com, and we’ll get back to you as soon as possible.

Media Kit

This resource hub provides everything you need to cover, collaborate, or promote OISY Wallet—a next-generation, fully on-chain crypto wallet designed for security, simplicity, and decentralization.

Project Info

OISY enables users to seamlessly manage and self-custody digital assets on multiple blockchains, simply by interacting with a rich web experience that is securely served directly into their web browsers by advanced smart contracts on the Internet Computer – without the need for web browser extensions and phone apps, which can be censored, and expose users’ private keys to danger.

Logo usage

Find more details on this page:


Product screenshots

Backgrounds

Team information & contact details

Social media:

  • X: https://x.com/oisy

For media inquiries, reach out to contact@oisy.com

Logos & Assets

A selection of OISY Wallet logos and assets for your integration.

When integrating OISY, please use one of the logos from this archive:


For most dApp integrations, we recommend using the following icon in SVG or PNG format:

Listing new dapps in Explorer

General Overview
General Overview - Dark mode
Chain Fusion Conversion Inteface
Send Interface
SWAP Interface
Light background
Dark background

To file a request to have your dApp listed in the dApps explorer of OISY Wallet, please submit this .

FAQ
Logos & Assets
dApp Submission Request
289KB
OISY logo options.zip
archive
2KB
oisy-logo-mark.svg
image
SVG logo version
9KB
oisy-logo-mark.png
image
PNG logo version
OISY icon

Finding & Using dApps

On Desktop

1. Open OISY Wallet.

2. Click ‘Explore’ in the left menu.

3. Use filters (All, dApps, DeFi, etc.) to find the dApp you need.

4. Click ‘Go to [dApp name]’—this opens the dApp in a new tab.


On Mobile

1. Open OISY Wallet.

2. Tap the account icon (top right).

3. Select ‘Explore’ from the dropdown menu.

4. Use filters to browse dApps.

5. The dApp opens in a new window. Click ‘Done’ to return to OISY.

FAQ

Who controls the private key for the native assets?

The private keys are controlled by the Network Nervous System (NNS), a decentralized autonomous organization (DAO) on the Internet Computer. These keys are secured using threshold cryptography, meaning they are collectively managed by the network and inaccessible to any individual or entity, including Oisy.

Learn more: NNS Overview


What chains is OISY Wallet currently compatible with?

Bitcoin, Ethereum, Solana, ICP, Binance Smart Chain, Base, Polygon and many more to come


Can OISY access the private keys of the native assets?

No, Oisy cannot access the private keys. The private keys are held as decentralized threshold keys on the internet computer. Transactions can be signed only by a user authorized by the NNS-controlled Internet Identity via the NNS-controlled Chain Fusion Signer canister.

Read more: What is the Chain Fusion Signer


How are transactions signed for these native assets?

Transactions are signed by a canister smart contract on the Internet Computer, called the Chain Fusion Signer. This ensures secure and decentralized transaction handling without exposing the private keys.

Read more: How Transactions Work


Is the address created specifically for me as an end-user?

Yes, the address is created specifically for you during the setup of your Oisy wallet. The Chain Fusion Signer canister generates this unique address tied to your account.

Reference: Canister Key Management


How does this wallet differ from Trust Wallet or other multichain wallets?

Unlike Trust Wallet and similar wallets, where you own and manage the private keys directly, the Oisy wallet relies on network custody via the Internet Computer’s NNS. This ensures decentralized control and removes the risk of private key exposure, while still providing you full control over your assets through the canister system.

Learn more: T-Signatures and Custody


Do I really have ownership over this wallet?

Yes, you have functional ownership. While the private keys are held securely by the network, your wallet is tied to your identity, and only you can authorize actions through the decentralized infrastructure. This combines ease of use with decentralized security.

More on This Here


Can I send tokens from OISY to another Wallet (i.e. can I send USDC to my phantom wallet)

Yes you can, You just need the recipient address and you can send tokens from OISY Wallet any time you wish


What does OISY Stand for?

Open Internet Services-y (read more here)


Whats the difference between OISY Wallet and Internet Identity

OISY Wallet and Internet Identity serve distinct roles in the ICP ecosystem. Internet Identity is an authentication tool that creates unique wallets for each app, ensuring security but fragmenting assets. OISY Wallet unifies asset management with one wallet across apps, eliminating fragmentation. It offers features like in-wallet swaps, multi-chain support (e.g., Solana tokens like $SOL), and integrations with dApps like KongSwap. While Internet Identity focuses on secure logins, OISY combines security with advanced tools for streamlined, comprehensive DeFi management. Please see ‘How is my principal handled using OISY’ for slightly more context


How is my principal handled using OISY?

When you connect your OISY wallet to any dApp, it uses the same principal ID, which means you access the same funds across all dApps.

However, when you log in to different dApps using the same Internet Identity, each dApp assigns a unique principal ID. So even though you use the same login identity, each dApp, including OISY, recognizes you differently and assigns a separate principal.


What do I do if I have an issue or a problem?

To ensure you are communicating directly with a team member, please email Support@oisy.com or open a support ticket in our Discord. We will soon introduce a support widget on our website, but currently, these are the only verified methods to reach our team.


Do you have a mobile app or Wallet browser?

We do not have these currently, however the wallet is optimised for mobile and will not interfere with prioritized browser extension modals.


How do I partner with OISY?

To discuss a partnership with OISY, please join our Discord, open a support ticket, and select the appropriate context for your inquiry. This is the required step to initiate the partnership process.


Do you have a tester programme?

Yes, we have a tester program where we engage testers to refine features before releases. To join, keep an eye on our Discord and social media channels for announcements about new tester recruitment.


I’m not seeing the complete history of the tokens in my wallet

If certain tokens are missing from your history, it might be because their Ledger and Index Canisters (IC) need to be added. Informing the project to add these canisters can help us ensure you receive the seamless UX you expect from us.


Why is the price/value not showing for a token in the wallet?

Different wallets use different oracles for sourcing price data. We currently rely on CoinGecko, and because some tokens are not listed there or may fluctuate, their prices may not appear either because they are not available or because of volatility


Why is the token logo not showing for a token in the wallet?

Token logos in OISY Wallet are displayed based on the metadata provided by the token’s canister. If the logo is included directly in the metadata, it will appear in your wallet as expected.

However, if the logo is linked via an external URL, OISY won’t display it. This is an intentional choice to protect your privacy and avoid exposing users to third-party resources that could be tracked or changed.

If you’re a project team and want your logo to appear, please ensure it’s embedded directly in the token’s metadata rather than linked externally.


Can I use Multisig on OISY?

Yes, OISY supports multisig functionality in line with ICRC-2 standards. This allows users to pre-approve a specific amount that can be accessed by Dapps without further consent, enabling multiple transactions up to the approved limit.

If you have specific multisig needs that involve all users signing each transaction, please let us know so we can ensure compatibility and provide further assistance.


What is Network Custody?

Network custody is a cutting-edge approach to digital asset security that eliminates the traditional need for direct private key management by users. This method leverages the decentralized architecture of the Internet Computer, enhancing both security and usability.


How does Network Custody compare to traditional methods?

Unlike traditional self-custody, which requires users to safeguard their own private keys, and custodial services that pose risks of centralized control, network custody in OISY simplifies access while distributing security risks.


How is Network Custody implemented in OISY?

OISY utilizes threshold cryptography technology on the Internet Computer to split private keys into shares that are distributed across various nodes. This method ensures that no single node can access the complete key, significantly enhancing security during transactions.


What are the advantages of using Network Custody?

Network custody provides numerous benefits:

  • Enhanced Security: By decentralizing key storage and using advanced cryptographic techniques, it becomes much harder for unauthorized users to access digital assets.

  • Simplified Access: Users can authenticate via modern methods like biometrics—no need to remember complex passwords or seed phrases.

  • Peace of Mind: Users no longer need to worry about losing keys or theft from personal devices.

  • Cost-Effective: Reduces the need for extensive security infrastructure for businesses, lowering operational costs.


How to "Connect with OISY"

Connect with OISY to your app

For the OISY Wallet integration, here are a few options to explore:

Note: Older ledgers that do not support the ICRC-21 standard currently are not compatible with the OISY Wallet, but we are adding support for this in the coming weeks.

Build and Run Yourself

Prerequisites

Start the local replica

When you're done with development, or you're switching to a different dfx project, running

from the project directory will stop the local replica.

Run OISY locally

Make sure you switch back to the project root directory.

First, install the frontend dependencies by running

It should output something like the following

Click on the frontend URL to access the OISY Wallet that is running locally.

Local development

Backend

If you want to locally deploy the backend only, you use the following command

Frontend

The frontend is written entirely in Svelte. You can serve the frontend in development mode like you normally develop a svelte app using the command

Dependencies

Some Iconly icons are used in the project, not included. You must obtain a license separately.

For React frontends, the and related would be a great place to start. It’s like a WalletConnect for the Internet Computer.

For Typescript, take a look at (which is the underlying library for IdentityKit).

We also provide a reference implementation, . Its features are more opinionated and limited to transfers or approvals with ICP or ICRC ledgers, so for a more general-purpose solution, the above two options might be a better fit.

Install the .

Open a new terminal window in the project directory, and run the following command to start the local replica. The replica will not start unless exists in the current directory.

To build and deploy the project locally, first create a .env.development file by copying the file. Once you've correctly set the api keys for all the different services that OISY needs, then run:

See

The backend is written in Rust and you can find it under the . It uses the provided by IC. To find out more about tECDSA, you can read the .

The license for this project is bought and owned by the DFINITY Foundation, please see terms and conditions .

dfx start --background
dfx stop
npm ci
npm run deploy
...
Deployed canisters.
URLs:
  Frontend canister via browser
    frontend: http://127.0.0.1:4943/?canisterId=br5f7-7uaaa-aaaaa-qaaca-cai
  Backend canister via Candid interface:
    backend: http://127.0.0.1:4943/?canisterId=bd3sg-teaaa-aaaaa-qaaba-cai&id=bkyz2-fmaaa-aaaaa-qaaaq-cai
    internet_identity: http://127.0.0.1:4943/?canisterId=bd3sg-teaaa-aaaaa-qaaba-cai&id=be2us-64aaa-aaaaa-qaabq-cai
dfx deploy backend
npm run dev
IdentityKit
demo
@slide-computer/signer
@dfinity/oisy-wallet-signer
IC SDK
dfx.json
.env.example
HACKING
backend folder
tECDSA API
Eurocrypt 2022 paper
Iconly Pro
here

ICP Building Blocks

What are the unique ICP technical building blocks enabling the creation of OISY?

  • Chain-key signatures: the world's best threshold ECDSA signature protocol suite (only available on ICP) enables smart contracts to perform cryptographic signatures without a single entity having full access to the private key. Read more about chain-key cryptography or start building based on chain-key signature sample code.

  • Internet Identity (II): based on ICP's threshold BLS signature schemes and WebAuthn, Internet Identity (II) is an authentication and key management system with strong privacy and security guarantees. Using WebAuthn, users can conveniently create secure sessions with their fingerprint or other biometric identifiers. Read more about Internet Identity technology or start integrating II into your canister smart contract.

  • Web applications served from chain: ICP is not only designed to run backends, such as ledgers, on chain, its low storage cost and low latency allow it to serve frontends, such as HTML files and images, from chain, too. Read more about smart contracts serving web applications or directly start building your first decentralized web frontend.

  • (Upcoming) HTTP outcalls: for now, OISY calls centralized Ethereum endpoints, such as Infura or Alchemy, from the frontend. In the future, OISY might be improved to use HTTP outcalls to call these endpoints in a decentralized fashion. Check out the HTTP outcalls sample code to explore how to use Web 2.0 services on ICP.

Feb 27, 2025 (OISY v1 Live)

OISY – the 1st fully-decentralized wallet for Bitcoin, Ethereum, Solana and ICP

OISY enables users to seamlessly manage and self-custody digital assets on multiple blockchains, simply by interacting with a rich web experience that is securely served directly into their web browsers by advanced smart contracts on the Internet Computer – without the need for web browser extensions and phone apps, which can be censored, and expose users’ private keys to danger.

Zurich, Switzerland — February 27, 9 AM ET — A revolutionary new wallet paradigm has transitioned into production: the DFINITY Foundation announces that Version 1.0 of the OISY wallet is live, as the result of its incubation of the project. OISY provides its functionality through a seamless web experience, which is served directly from the blockchain by advanced smart contracts. With OISY, the installation of risky wallet software such as web browser extensions and phone apps is not necessary, and users simply authenticate using modern passkey technology. By building on “chain key” crypto technology, OISY trustlessly integrates with Bitcoin, Ethereum, Solana and ICP, and support for more chains is planned. OISY’s source code is open source and verifiable.

A revolutionary wallet design addressing key risks

Traditional crypto wallets take the form of web browser extensions, and phone apps, which come with several risks. Firstly, browser extensions and apps must hold their users’ private keys in plaintext to sign transactions, which can expose them to malware running on users’ computers. Secondly, the distribution of browser extensions and apps can be censored by parties such as the Chrome Web Store, and the Apple App Store (which have both censored wallets in the past). Thirdly, malicious insiders at corporations providing these services can in principle maliciously alter wallet software. Fourthly, the user must trust that the developers who created the software did not deliberately, or inadvertently, include malicious software logic themselves. With OISY, users use passkeys to authenticate themselves to smart contracts via a web experience they serve directly. Passkey technology maintains authentication data, and signs sessions, inside special secure hardware on modern phones and laptops, which keeps it safe. Meanwhile, users’ tokens are held by the smart contracts themselves, using “chain key” technology. When the smart contracts must sign blockchain transactions for their users, independent blockchain nodes cooperate to create the signatures through consensus. OISY’s entire code - frontend and backend - is implemented as smart contracts running on ICP. This means that the code of OISY cannot only be publicly audited, it can also be publicly verified that the correct code is deployed and runs on the Internet Computer. Thus, the risks of key compromise, key loss, phishing attacks and third party failures are greatly reduced.

Totally seamless, multi-chain functionality

OISY isn’t just about improving security, it's also about providing a better user experience for those wishing to self-custody digital assets on multiple blockchains. Traditional crypto wallets require users to craft transactions themselves, a process that can be cumbersome, error-prone and difficult for non-technical users to accomplish. OISY provides a more seamless user experience, where user-friendly interactions with a web experience cause smart contracts to sign transactions on their behalf, requiring less work, and less skill. Because the smart contracts leverage “chain key” technology, they can trustlessly sign transactions for users on multiple blockchains – enabling OISY users to interact with tokens and decentralized applications (dApps) on Bitcoin, Ethereum, Solana and ICP. The user experience is far more seamless and greatly improved for novices and experienced crypto users alike.

Key Features:

  • An exclusively in-browser wallet experience, which is richer, more friendly, and seamless, since users do not have to sign transactions manually

  • A unified wallet for BTC, ETH, SOL, and ICP, with support for more networks coming

  • Users authenticate to their fully decentralized wallet, served from chain via the URL oisy.com, using passkeys.

  • The smart contracts that serve the user experience custody tokens for users, and sign transactions, using “chain key” technology.

  • The wallet is built exclusively from advanced smart contracts running on the Internet Computer, in full decentralization, reducing censorship and security risks, and increasing resilience.

  • Chain key technology is trustless, and multi-chain, allowing OISY to trustlessly manage tokens and interact with other blockchains without using bridging technology.

  • Users authenticate to OISY using an Internet Identity, which allows users to associate multiple passkeys, and thus access their wallets from multiple devices, such as phones and laptops.

  • Within the web experience, users can purchase new digital assets using fiat through a centralized onramper service that has been integrated.

  • Within the web experience, users can swap digital assets with lighting speed through built-in swaps functionality that integrates with external DEXs.

  • The wallet now drops random token rewards into eligible users wallets, to incentivize usage.

Delivering World Computer functionality using the Internet Computer

The “World Computer” is the amalgamation of all blockchains hosting tokens and smart contracts, and the overall vision is one of decentralization. The Internet Computer (ICP) is a blockchain with a unique architecture that helps realize this vision: it hosts advanced smart contracts that pay for their own computation (reverse gas), serve web experiences, process and store large amounts of data efficiently, and trustlessly interact with other blockchains using “chain key” cryptography. The Internet Computer is bringing the World Computer vision to life by enabling fully-decentralized, fully-onchain, and multichain experiences, such as OISY, to be created.

The “OISY Sprinkles” program provides exciting incentives to users To celebrate the release of Version 1.0, OISY is kicking off the “OISY Sprinkles” program. As part of this program, at unpredictable times, the OISY project will distribute semi-random quantities of well-known tokens, such as Bitcoin and ether, into users’ wallets, to reward them for their activity.

Dominic Williams, Founder and President of the DFINITY Foundation: "OISY provides a wonderful example of the World Computer paradigm, which is made possible by the next-generation crypto technology provided by ICP."

Akeel Qureshi, Core Contributor at OISY Wallet, stated: “Technology should feel invisible when it’s working at its best. No one thinks about the TCP/IP stack when they send an email, and no one should have to think about blockchain protocols when managing their assets. With OISY, we’re stripping away the barriers, reducing friction to nothing, and making decentralized finance as seamless as it was always meant to be.”

Pierre Samaties, Chief Business Officer at DFINITY, added: “OISY Wallet streamlines multi-chain asset management while increasing decentralization and security. By removing the complexity of key management, OISY makes multi-chain digital asset management accessible to a wider audience.”

-end-

About OISY Wallet

OISY is a fully-decentralized, fully-onchain, in-browser Web3 wallet providing multichain functionality. It is created by advanced smart contracts hosted on the Internet Computer (ICP) blockchain that serve web experiences to users, and can custody of their tokens using “chain key” technology. Users authenticate to the smart contracts over the web using passkey technology, and cause the smart contracts to seamlessly sign transactions for them through their interactions with the web experience.

About the Internet Computer

The Internet Computer is a blockchain network created by Internet Computer Protocol (ICP), whose main token is also called ICP. The technology involved was primarily developed by the DFINITY Foundation (founded 2016), and has benefited from more than 1000 person years of R&D effort to date, involving a world-famous, international team. Although the Internet Computer is a blockchain, it is designed to perform the role of a cloud computing platform that hosts a new form of advanced smart contract software within a serverless environment. Internet Computer smart contract software pays for its own compute using a “reverse gas” paradigm, can serve secure web experiences directly to end users, can process and store large amounts of data efficiently onchain, and can scale. In addition to traditional blockchain applications such as DeFi, the Internet Computer can host apps such as social networks, enterprise systems and AI, fully-onchain, in the form of smart contract software. This means that Web3 apps and services can be built with complete decentralization, greatly increasing censorship resistance, security, and resilience, and enabling full autonomy where required. The Internet Computer blockchain is powered by “chain key” technology, which also allows the smart contracts it hosts to trustlessly interact with tokens and smart contracts on other blockchains, without need for bridges.

OISY Sprinkles

Episode 3 (Current Version) – Expanding Rewards & Referrals

The OISY Sprinkles program continues—with new ways to earn and new reasons to stay active. Episode 3 keeps the core structure from earlier phases while expanding rewards through referrals and giving the community a path to unlock what comes next.

Program Overview

OISY Sprinkles is designed to distribute tokens randomly but not without method. The initiative targets active users of the OISY Wallet, rewarding those who consistently engage with our platform.

How to Earn Sprinkles

We’re keeping the core rewards structure in place, so all active OISY users can continue earning as before::

  • Hold: Maintain at least $20 worth tokens**

  • Login: Check in at least once every 7 days.

  • Transact: Complete at least two transactions every 7 days.

50 random airdrops occur each day based on wallet activity.

** the token needs to display a price in the wallet to be eligible.

New: Referral Rewards

  • When someone you refer deploys a new wallet, you earn 10% of their Sprinkles for the next 30 days.

  • They still get 100% of their rewards—you just get a bonus on top.

  • The more active friends you invite, the more Sprinkles you earn.

Introducing the Super Sprinkle

  • Our highest daily reward is getting a new name: the Super Sprinkle.

  • One drop per day will award ~$50 in BTC to five randomly selected users.

  • Win a Super Sprinkle? Post about it, and you become eligible to win again.

Want us to extend the campaign?

Want OISY Sprinkles to keep going? So do we! If a set number of new, active wallets are deployed, we’ll extend the campaign into Episode 4.

Stay Active, Earn More

Whether you’re earning through activity, referring friends, or getting lucky with a Super Sprinkle, there’s more BTC up for grabs than ever. Keep using OISY Wallet, and you might just wake up to a surprise in yours.

For more information, visit

| |

Now you can earn even more BTC just by to OISY!

Build and Run Yourself
OISY.com
X
GitHub
Docs
inviting friends

Best Practices

  • Safeguard Your Internet Identity: Only use it securely and judiciously to log into apps. Misuse can lead to permanent fund loss.

  • Use Enhanced Security: Enable FaceID, TouchID, or security keys for additional protection..

  • Decentralized Security with OISY: Fully on-chain and decentralized to eliminate third-party risks.

  • Manage Your Tokens Wisely: Only take actions with your tokens that suit your risk appetite

Buying Tokens

1. Open OISY Wallet at OISY.com.

2. Click ‘BUY’ on the main dashboard.

3. A new modal will appear with two dropdown menus labeled:

  • ‘You Spend’ – Select the token you want to use for the purchase.

  • ‘You Get’ – Choose the token you want to buy.

4. Enter the amount in either ‘You Spend’ or ‘You Get’, depending on whether you are specifying the amount you want to spend or the amount you want to receive.

5. In the ‘Buy via’ section, choose your preferred onramp provider from the dropdown menu.

6. (Optional) If you want to set up a recurring purchase, toggle ‘Repeat Payment’ on or off.

7. Under ‘Pay Using’, select your payment method (e.g., credit/debit card, bank transfer, or other available options).

8. Click ‘Continue’—you will be redirected to your selected third-party onramp provider.

9. Follow the provider’s instructions to complete the transaction (this may include KYC verification, entering payment details, and confirming the purchase).

10. Once the payment is confirmed, return to OISY Wallet—your purchased tokens should now appear in your wallet.

📌 Note: Processing times may vary depending on the onramp provider, payment method, and network congestion. Some providers may require additional verification before completing the transaction.

OISY Sprinkles – Episodes 1 & 2 (Archived)

(Feb 29 – April 7, 2025)

The OISY Sprinkles program began as part of the v1.0 launch of OISY Wallet—a campaign built to reward genuine user engagement with surprise token drops, distributed at random throughout the day to active wallets.

Episode 1 introduced a simple idea: if you use the wallet, you might just get sprinkled. Over the course of two episodes, that idea evolved.

Overview

OISY Sprinkles was designed to reward everyday usage: log in, make transactions, hold a balance—and you’re in. No forms, no claiming, no guessing. Just activity rewarded, quietly and fairly.

Eligibility Criteria

To qualify for rewards during either episode, users had to meet the following criteria within the 7 days prior to each drop:

  • Login: At least once

  • Transactions: Complete a minimum of two transactions

  • Account Balance: Maintain at least $20 USD worth of tokens in your wallet at the time of each airdrop

These simple actions unlocked eligibility for 50 random airdrops every single day.

How It Works

Daily Airdrops: 10 random airdrops were conducted throughout each day. The timing of these drops was dictated by platform activity and user engagement, giving active users a higher chance of receiving a Sprinkle.

Allocation: 1,550 total reward instances occurred throughout the campaign.

Specific Rewards: Each day, 5 participants received ~$50 worth of tokens. The remaining rewards were distributed across 45 other drops.

Continued Eligibility: Winning once did not affect future chances—eligibility reset with each drop cycle.

Episode Breakdown

Episode 1 (Feb 29 – March 10)

The program began with ICP and ecosystem tokens as the primary rewards. This phase established the core criteria and reward format that defined the Sprinkles structure.

Episode 2 (March 11 – April 7)

On March 11th, the program transitioned into Episode 2 with the inclusion of BTC and USDC as a reward tokens. This change expanded the scope of Sprinkles while maintaining the same eligibility requirements and daily reward structure.

Goals of the Program

Enhance User Engagement: By rewarding basic actions like logging in and transacting, we encouraged frequent and meaningful use of the OISY Wallet.

Promote the ICP Ecosystem: Distributing ICP and ecosystem tokens highlighted the utility of assets within the network.

Surprise and Delight: Random token drops added an unexpected and exciting layer to daily platform activity.

Looking Back

This effort laid the foundation for what OISY Sprinkles would become—rewarding, accessible, and community-driven. Episodes 1 and 2 introduced the mechanics, tested the structure, and set the tone for what comes next.

As the program evolves, we carry forward the same intent: reward participation and make every interaction with OISY more valuable. A new version of Sprinkles is now live.

Asset Control, Recovery, and Governance in OISY Wallet

Can OISY access the private keys of native assets? Who controls the assets?

Who manages OISY canisters? What happens to assets if canisters run out of cycles?

Critically, user assets always reside on their respective ledgers on the respective blockchains rather than within these canisters. Even if OISY canisters were to be removed or replaced, the underlying assets remain secure and can be accessed by their owners again once new or replacement canisters are deployed.

If an OISY canister would deplete its cycles, it would simply become “frozen,” meaning the Internet Computer stops scheduling it until it’s refueled with cycles—a process that anyone can perform. However, the OISY Wallet team has procedures in place to always keep canisters fuelled, ensuring reliable and continuous access to assets.

What happens to wallet assets if the domain OISY.com expires or is hacked?

The domain OISY.com serves merely as a human-friendly pointer to the onchain frontend canister. Should the domain expire or be compromised and pointed elsewhere, the integrity of the assets remains intact as transfers can only be executed upon owner authorization via their Internet Identity.

Can I access the private keys of Ethereum/Bitcoin/Solana wallets?

OISY Wallet uses the Internet Computer’s cryptographic threshold protocols as well as key derivation. Therefore it is not possible to extract the private keys. This innovative design strengthens security while preserving user sovereignty over Ethereum, Bitcoin, and Solana assets and relieves the user from the difficult and error prone task of managing and securing cryptographic keys.

What are the Recovery Options in OISY?

Because your Internet Identity ultimately governs access to your funds, the most important recovery measure is to safeguard your Internet Identity. We recommend adding backup devices such as a YubiKey to your Identity and make use of the passkey recovery mechanisms that Apple and Google offer for their devices. This ensures you have multiple ways to securely restore access to your OISY-managed assets.

Will the community be able to participate in project governance?

Currently, development is managed by the OISY Wallet team, incubated by the DFINITY Foundation. For projects built on the Internet Computer—like OISY Wallet—there is a strong push toward decentralization. The community can expect future developments in this area—stay tuned.

The private keys do not physically exist and thus OISY cannot access them. Assets are controlled by a distributed . This means no individual entity—including OISY—can ever gain full control over the key. Each user has sole authority over their assets and can exercise their control via the NNS-controlled canister and their . Only when a user explicitly authorizes a transaction to be signed, will the network run the cryptographic protocol to create a signature on the user’s behalf. This robust, decentralized design highlights OISY’s core strength: ensuring user sovereignty over assets while maintaining top-tier security and releaving the user from managing cryptographic keys.

OISY’s frontend (cha4i-riaaa-aaaan-qeccq-cai) and backend (doked-biaaa-aaaar-qag2a-cai) canisters are managed by the OISY Wallet development team, with updates undergoing rigorous code reviews and multi-level approvals. Meanwhile, the canister (grghe-syaaa-aaaar-qabyq-cai) and all Internet Identity canisters are governed by the Network Nervous System (NNS). Their code updates are of course also rigorously reviewed.

OISY Wallet is fully , allowing users to run a local version of the codebase and maintain independent access to their assets, even without oisy.com or the official canisters. Transaction signing occurs through the ChainFusion Signer with authorization via Internet Identity, both of which are controlled by the Network Nervous System (NNS), one of the largest DAOs globally..

cryptographic threshold protocol on the Internet Computer
Chain Fusion Signer
Internet Identity
Chain-Fusion Signer
open-source

T&C's

OISY REWARDS INITIATIVE - TERMS AND CONDITIONS

DFINITY Foundation, domiciled at Genferstrasse 11, 8002 Zurich, Switzerland (the “Foundation”) offers the OISY Sprinkles Program (the “Initiative”), inviting Participants to engage on the OISY platform and provide valuable feedback through such engagement. These Terms and Conditions (the “Terms”) apply to your participation in the Initiative and describe the Initiative’s requirements as well as the Rewards that you may be eligible to receive.

YOUR ENTRY IS VOID WHERE PROHIBITED. YOUR PARTICIPATION IN THE INITIATIVE IS ENTIRELY VOLUNTARY, BUT IF YOU ARE PARTICIPATING IN THE INITIATIVE YOU MUST STRICTLY ADHERE TO THESE TERMS. YOU MAY RECEIVE A REWARD (WHERE PERMITTED BY LAW) UPON RANDOM SELECTION BY AN ALGORITHM. REWARDS ARE AWARDED AT THE SOLE DISCRETION OF THE FOUNDATION AND IS NOT GUARANTEED.

  1. Certain Definitions.

  • “Participant” means all individuals that participate in the Initiative.

  • “Reward” means the tokens which may be awarded to Participants who have been randomly selected by an algorithm as a winner.

  • “Intellectual Property Rights” means patent rights (including patent applications and disclosures), copyrights, trademarks, trade secret rights, work and any other tangible or intangible property rights recognized in any country or jurisdiction in the world.

  • “Foundation Materials” means all information and materials that may be provided to Participant by the Foundation pursuant to the Initiative and all Intellectual Property Rights thereto.

  1. Eligibility; Initiative Requirements:

a. You may only participate in the Initiative if:

  • You are over 18 years old at the time of participation in the Initiative;

  • You are a resident of a jurisdiction where entry to the Initiative is not prohibited by law;

  • You are not a resident of, citizen, or located in a geographic area that is subject to UN-, US-, EU-, Swiss or any other sovereign country sanctions or embargoes;

  • You, nor, if applicable, any third party entities that you represent (i) is listed or associated with any person or entity being listed on any of the US Department of Commerce’s Denied Persons or Entity List, the US Department of Treasury’s Specially Designated Nationals List, the EU Consolidated List of Persons, Groups and Entities Subject to EU Financial Sanctions or the Swiss SECO’s Overall List of Sanctioned Individuals, Entities and Organizations, (ii) is a person identified as a terrorist organization or any other relevant lists maintained by any governmental authority;

  • Your participation in the Initiative is not in violation of any national, state, or local law or regulation applicable to you; and

  • If required, you successfully pass KYC, as applicable, according to a process that, in the sole discretion of the Foundation, is deemed sufficient.

b. The Initiative is open to individuals and entities that have completed the requirements following the instructions found here https://docs.oisy.com/rewards/get-to-know-oisy. If you are an employee of the Foundation or any of its subsidiaries or affiliates or an immediate family member of anyone thereof, you are eligible to participate in the Initiative but are ineligible to receive Rewards.

  • All Participants grant the Foundation a royalty-free worldwide license and right in perpetuity to use their name, image, and likeness for the purposes of producing, promoting, and advertising the Initiative, the Internet Computer and/or OISY.

  • Rewards. To be eligible to receive any Reward, participants must actively engage with our platform features and fulfill specific engagement criteria set for each reward cycle. REWARDS ARE DISBURSED TO PARTICIPANTS SELECTED RANDOMLY BY AN ALGORITHM AND EXECUTED VIA SMART CONTRACT. ALL DECISIONS RELATED TO THE INITIATIVE ARE FINAL AND NON-APPEALABLE. Taxes or other costs, if any, relating to receipt, acceptance and or use of Rewards are the sole responsibility of the Participant and the Foundation is not responsible for any disputes regarding reward dispersal.

  1. Entrant Requirements.

Rewards are granted without warranty of any kind from the Foundation, express or implied, without limitation. All applicable laws and regulations apply.

5. Marketing and Promotion.

  1. Publicity. You will not issue any press releases or similar public announcements in connection with these Terms, without the prior written approval of the Foundation.

  2. Public Relations. You will: (a) conduct your business and activities in connection with these Terms in such a manner so as to promote a good image and public relations for the Foundation, the Internet Computer and OISY; (b) not engage in any unfair or deceptive trade practice involving the Foundation, the Internet Computer or OISY; and (c) not make any false, misleading or disparaging representations or statements with regard to the Foundation, the Internet Computer or OISY.

6. Representations and Warranties.

  1. Participant Representations and Warranties. You represent and warrant that: (a) you have the authority to enter into these Terms; and (b) the information submitted to the Foundation in connection with your participation in the Initiative, including in any application or Entry, is accurate and complete.

  2. Disclaimer. THE INITIATIVE WEBSITE, INCLUDING BUT NOT LIMITED TO THE FOUNDATION WEBSITE, THIRD PARTY WEBSITES SUPPORTING THE INITIATIVE, AND ANY FOUNDATION MATERIALS YOU MAY HAVE ACCESS TO IN CONNECTION WITH THE INITIATIVE ARE PROVIDED “AS-IS” AND “AS AVAILABLE,” WITH ALL FAULTS, DEFECTS AND ERRORS, AND WITHOUT WARRANTY OF ANY KIND. THE FOUNDATION DISCLAIMS ALL REPRESENTATIONS AND WARRANTIES (EXPRESS, IMPLIED, ARISING BY LAW OR OTHERWISE) IN CONNECTION WITH THESE TERMS, INCLUDING ANY REPRESENTATIONS OR WARRANTIES REGARDING MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT. THE FOUNDATION MAKES NO REPRESENTATION OR WARRANTY THAT: (I) THE INITIATIVE, THE INITIATIVE SITE, FOUNDATION WEBSITES OR FOUNDATION MATERIALS WILL MEET YOUR REQUIREMENTS, THEIR OPERATION WILL BE UNINTERRUPTED OR ERROR-FREE OR THAT ANY ERRORS WILL BE CORRECTED; OR (II) YOU WILL PROFIT OR DERIVE ANY ECONOMIC BENEFIT FROM YOUR PARTICIPATION IN THE INITIATIVE.

7. Intellectual Property.

  1. Participant Materials. By participating in this Initiative, you agree that any creative ideas, suggestions, or other materials you submit in connection with this Initiative, in any form, are not being made in confidence or trust and that no confidential or fiduciary relationship is intended or created between you and the Foundation in any way, and that you have no expectation of review, compensation, or consideration of any type either now or in the future.

  2. Foundation Materials. The Foundation hereby grants Participant, during the Term, a limited license to use the Foundation Materials solely in connection with Participant’s participation in the Initiative. Such a limited license will automatically terminate once you are no longer a Participant in the Initiative.

  3. Ownership. As between you and the Foundation, the Foundation owns all right, title and interest in and to the Foundation Materials (including, the Initiative site, the Foundation website and its trademarks, as well as all associated Intellectual Property Rights thereto. There are no implied licenses granted by either party, whether by implication, estoppel or otherwise.

8. Confidentiality. At all times, during the term of these Terms and thereafter, and to the fullest extent permitted by law, you agree to hold all Confidential Information (as defined below) in strict confidence, not to use it in any way, commercially or otherwise, except for purposes contemplated under the Initiative, and not to disclose it to others. You also agree to take all actions reasonably necessary to protect the confidentiality of all Confidential Information. As used herein, “Confidential Information” means: (i) any information, materials or knowledge regarding OISY, the Internet Computer ,the Foundation and its business, financial condition, products, programming techniques, customers, suppliers, technology or research and development that is disclosed to you or to which you have access in connection with participating in the Initiative and (ii) these Terms. Confidential Information will not include any information that: (a) is or becomes part of the public domain through no fault of you; (b) was rightfully in your possession at the time of disclosure, without restriction as to use or disclosure; or (c) you rightfully receive from a third party who has the right to disclose it and who provides it without restriction as to use or disclosure. Notwithstanding the foregoing, Confidential Information includes any information that, due to its nature or the circumstances of its disclosure, a reasonable person would know, or would have reason to know, should be treated as confidential.

9. Release and Indemnification. You agree to fully and finally release, indemnify, defend and hold the Foundation and its parent, affiliates, subsidiaries, directors, officers, employees and agents, including advertising and promotion agencies, and assigns, and any other organizations related to the Initiative, harmless from any and all claims, injuries, damages, expenses or losses to person or property and/or liabilities of any nature that in any way arise from participation in the Initiative, your Participant Materials or acceptance or use of a Reward, including without limitation (i) any condition caused by events beyond the Foundation’s control that may cause the Initiative to be disrupted; (ii) any injuries, losses, or damages (compensatory, direct, incidental, consequential or otherwise) of any kind arising in connection with or as a result of any benefit you may receive in connection with the Initiative, or acceptance, possession, or use of a Reward, or from participation in the Initiative; and (iii) any printing or typographical errors in any materials associated with the Initiative.

10. Limitation of Liability. NEITHER THE FOUNDATION NOR ANY OTHER PARTY INVOLVED IN THE ADMINISTRATION OF THE INITIATIVE WILL BE LIABLE FOR ANY INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES, INCLUDING LOST PROFITS, LOSS OF DATA OR GOODWILL, SERVICE INTERRUPTION, COMPUTER DAMAGE OR SYSTEM FAILURE ARISING OUT OF OR IN CONNECTION WITH THESE TERMS, WHETHER BASED ON WARRANTY, CONTRACT, TORT (INCLUDING NEGLIGENCE), PRODUCT LIABILITY OR ANY OTHER LEGAL THEORY, AND WHETHER OR NOT THE FOUNDATION HAS BEEN INFORMED OF THE POSSIBILITY OF SUCH DAMAGE, EVEN IF A LIMITED REMEDY SET FORTH HEREIN IS FOUND TO HAVE FAILED OF ITS ESSENTIAL PURPOSE. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES OR DAMAGES CAUSED BY GROSS NEGLIGENCE OR WILLFUL INTENT, SO THE ABOVE LIMITATION MAY NOT APPLY TO YOU. IN NO EVENT WILL THE FOUNDATION’S TOTAL LIABILITY ARISING OUT OF OR IN CONNECTION WITH THESE TERMS EXCEED FIFTY U.S. DOLLARs ($50.00). THE EXCLUSIONS AND LIMITATIONS OF DAMAGES SET FORTH ABOVE ARE FUNDAMENTAL ELEMENTS OF THE BASIS OF THE BARGAIN BETWEEN YOU AND THE FOUNDATION.

11. Termination. The term of these Terms commences from the date the Initiative begins and continues until (i) the completion of Participant’s participation in the Initiative or (ii) these Terms or the Initiative is terminated by the Foundation, whichever is earlier (the “Term”). For example, if for any reason the Initiative is not capable of running as planned due to unforeseen changes in business conditions, infection by computer virus, bugs, tampering, unauthorized intervention, fraud, technical failures, or any other causes which corrupt or affect the administration, security, fairness, integrity, or proper conduct of the Initiative, the Foundation reserves the right at its sole discretion to amend these Terms or cancel, terminate, modify or suspend the Initiative and terminate these Terms. The Foundation may also terminate these Terms for convenience upon ten (10) days’ written notice. Upon any termination, discontinuation or cancellation of the Initiative or these Terms, all provisions of these Terms which by their nature should survive will survive, including, without limitation, ownership provisions, warranty disclaimers, limitations of liability, and dispute resolution provisions.

12. Privacy Policy and Personal Information. Any personal information and Participant Materials submitted by you in connection with the Initiative will be used for the purposes described in these Terms and will otherwise be handled in accordance with the Foundation’s Privacy Policy, which may include processing or use by third parties solely within the scope of the Terms of this Agreement, located at https://DFINITY.org/privacy-policy/, and you acknowledge and agree to such use.

13. Assignment. You may not assign or transfer these Terms by operation of law or otherwise) without the prior written consent of the Foundation and any prohibited assignment will be null and void. The Foundation may assign these Terms or any rights hereunder without your consent. Subject to the foregoing, these Terms will bind and inure to the benefit of the parties’ permitted successors and assigns.

14. Miscellaneous. The Foundation is not responsible for transmission errors resulting in omission, interruption, deletion, defect, delay in operations or transmission, theft or destruction or unauthorized access to or alterations of Participant Materials, or for technical, network, telephone equipment, electronic, computer, hardware or software malfunctions or limitations of any kind, or inaccurate transmissions of or failure to receive entry information by the Foundation on account of technical problems or traffic congestion on the Internet or at any website or any combination thereof. The Foundation is also not responsible for injury or damage to your computer or any other damage resulting from any downloading of any materials in connection with the Initiative. In the event that any provision in these Terms is held to be invalid or unenforceable, the unenforceable part will be given effect to the greatest extent permitted by law and the remaining provisions will remain in full force and effect to the maximum extent permitted by law. The failure of a party to enforce any right or provision of these Terms will not be deemed a waiver of such right or provision. You agree that these Terms and the rules, restrictions and policies contained herein, and the Foundation’s enforcement thereof, are not intended to confer and do not confer any rights or remedies upon any person other than you and the Foundation. These Terms, any exhibits, and any other policies of the Foundation incorporated herein by reference constitute the entire agreement between the Foundation and you with respect to the subject matter of these Terms.

15. Governing Law; Dispute Resolution. These Terms will be governed by and interpreted in accordance with the laws of Switzerland excluding that body of law pertaining to conflict of laws. Any dispute, controversy, difference or claim arising out of or relating to these Terms, including the existence, validity, interpretation, performance, breach or termination thereof or any dispute regarding non-contractual obligations arising out of or relating to it shall be referred to and finally resolved by arbitration in accordance with the Swiss Rules of International Arbitration of the Swiss Arbitration Centre in force when the Notice of Arbitration is submitted in accordance with those rules. The law of this arbitration clause shall be Swiss law. The seat of arbitration shall be Zurich, Switzerland. The number of arbitrators shall be one. The arbitration proceedings shall be conducted in English.

16. Contact. If you have any questions about the Initiative or the Terms, please contact support@oisy.com.

IF YOU DO NOT AGREE TO THESE TERMS, PLEASE DO NOT REGISTER OR OTHERWISE PARTICIPATE IN THE INITIATIVE.

T&C's

OISY REWARDS INITIATIVE - TERMS AND CONDITIONS

DFINITY Foundation, domiciled at Genferstrasse 11, 8002 Zurich, Switzerland (the “Foundation”) offers the OISY Sprinkles Program (the “Initiative”), inviting Participants to engage on the OISY platform and provide valuable feedback through such engagement. These Terms and Conditions (the “Terms”) apply to your participation in the Initiative and describe the Initiative’s requirements as well as the Rewards that you may be eligible to receive.

YOUR ENTRY IS VOID WHERE PROHIBITED. YOUR PARTICIPATION IN THE INITIATIVE IS ENTIRELY VOLUNTARY, BUT IF YOU ARE PARTICIPATING IN THE INITIATIVE YOU MUST STRICTLY ADHERE TO THESE TERMS. YOU MAY RECEIVE A REWARD (WHERE PERMITTED BY LAW) UPON RANDOM SELECTION BY AN ALGORITHM. REWARDS ARE AWARDED AT THE SOLE DISCRETION OF THE FOUNDATION AND IS NOT GUARANTEED.

  1. Certain Definitions.

  • “Participant” means all individuals that participate in the Initiative.

  • “Reward” means the tokens which may be awarded to Participants who have been randomly selected by an algorithm as a winner.

  • “Intellectual Property Rights” means patent rights (including patent applications and disclosures), copyrights, trademarks, trade secret rights, work and any other tangible or intangible property rights recognized in any country or jurisdiction in the world.

  • “Foundation Materials” means all information and materials that may be provided to Participant by the Foundation pursuant to the Initiative and all Intellectual Property Rights thereto.

  1. Eligibility; Initiative Requirements:

a. You may only participate in the Initiative if:

  • You are over 18 years old at the time of participation in the Initiative;

  • You are a resident of a jurisdiction where entry to the Initiative is not prohibited by law;

  • You are not a resident of, citizen, or located in a geographic area that is subject to UN-, US-, EU-, Swiss or any other sovereign country sanctions or embargoes;

  • You, nor, if applicable, any third party entities that you represent (i) is listed or associated with any person or entity being listed on any of the US Department of Commerce’s Denied Persons or Entity List, the US Department of Treasury’s Specially Designated Nationals List, the EU Consolidated List of Persons, Groups and Entities Subject to EU Financial Sanctions or the Swiss SECO’s Overall List of Sanctioned Individuals, Entities and Organizations, (ii) is a person identified as a terrorist organization or any other relevant lists maintained by any governmental authority;

  • Your participation in the Initiative is not in violation of any national, state, or local law or regulation applicable to you; and

  • If required, you successfully pass KYC, as applicable, according to a process that, in the sole discretion of the Foundation, is deemed sufficient.

b. The Initiative is open to individuals and entities that have completed the requirements following the instructions found here https://docs.oisy.com/rewards/get-to-know-oisy. If you are an employee of the Foundation or any of its subsidiaries or affiliates or an immediate family member of anyone thereof, you are eligible to participate in the Initiative but are ineligible to receive Rewards.

  • All Participants grant the Foundation a royalty-free worldwide license and right in perpetuity to use their name, image, and likeness for the purposes of producing, promoting, and advertising the Initiative, the Internet Computer and/or OISY.

  • Rewards. To be eligible to receive any Reward, participants must actively engage with our platform features and fulfill specific engagement criteria set for each reward cycle. REWARDS ARE DISBURSED TO PARTICIPANTS SELECTED RANDOMLY BY AN ALGORITHM AND EXECUTED VIA SMART CONTRACT. ALL DECISIONS RELATED TO THE INITIATIVE ARE FINAL AND NON-APPEALABLE. Taxes or other costs, if any, relating to receipt, acceptance and or use of Rewards are the sole responsibility of the Participant and the Foundation is not responsible for any disputes regarding reward dispersal.

  1. Entrant Requirements.

Rewards are granted without warranty of any kind from the Foundation, express or implied, without limitation. All applicable laws and regulations apply.

5. Marketing and Promotion.

  1. Publicity. You will not issue any press releases or similar public announcements in connection with these Terms, without the prior written approval of the Foundation.

  2. Public Relations. You will: (a) conduct your business and activities in connection with these Terms in such a manner so as to promote a good image and public relations for the Foundation, the Internet Computer and OISY; (b) not engage in any unfair or deceptive trade practice involving the Foundation, the Internet Computer or OISY; and (c) not make any false, misleading or disparaging representations or statements with regard to the Foundation, the Internet Computer or OISY.

6. Representations and Warranties.

  1. Participant Representations and Warranties. You represent and warrant that: (a) you have the authority to enter into these Terms; and (b) the information submitted to the Foundation in connection with your participation in the Initiative, including in any application or Entry, is accurate and complete.

  2. Disclaimer. THE INITIATIVE WEBSITE, INCLUDING BUT NOT LIMITED TO THE FOUNDATION WEBSITE, THIRD PARTY WEBSITES SUPPORTING THE INITIATIVE, AND ANY FOUNDATION MATERIALS YOU MAY HAVE ACCESS TO IN CONNECTION WITH THE INITIATIVE ARE PROVIDED “AS-IS” AND “AS AVAILABLE,” WITH ALL FAULTS, DEFECTS AND ERRORS, AND WITHOUT WARRANTY OF ANY KIND. THE FOUNDATION DISCLAIMS ALL REPRESENTATIONS AND WARRANTIES (EXPRESS, IMPLIED, ARISING BY LAW OR OTHERWISE) IN CONNECTION WITH THESE TERMS, INCLUDING ANY REPRESENTATIONS OR WARRANTIES REGARDING MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT. THE FOUNDATION MAKES NO REPRESENTATION OR WARRANTY THAT: (I) THE INITIATIVE, THE INITIATIVE SITE, FOUNDATION WEBSITES OR FOUNDATION MATERIALS WILL MEET YOUR REQUIREMENTS, THEIR OPERATION WILL BE UNINTERRUPTED OR ERROR-FREE OR THAT ANY ERRORS WILL BE CORRECTED; OR (II) YOU WILL PROFIT OR DERIVE ANY ECONOMIC BENEFIT FROM YOUR PARTICIPATION IN THE INITIATIVE.

7. Intellectual Property.

  1. Participant Materials. By participating in this Initiative, you agree that any creative ideas, suggestions, or other materials you submit in connection with this Initiative, in any form, are not being made in confidence or trust and that no confidential or fiduciary relationship is intended or created between you and the Foundation in any way, and that you have no expectation of review, compensation, or consideration of any type either now or in the future.

  2. Foundation Materials. The Foundation hereby grants Participant, during the Term, a limited license to use the Foundation Materials solely in connection with Participant’s participation in the Initiative. Such a limited license will automatically terminate once you are no longer a Participant in the Initiative.

  3. Ownership. As between you and the Foundation, the Foundation owns all right, title and interest in and to the Foundation Materials (including, the Initiative site, the Foundation website and its trademarks, as well as all associated Intellectual Property Rights thereto. There are no implied licenses granted by either party, whether by implication, estoppel or otherwise.

8. Confidentiality. At all times, during the term of these Terms and thereafter, and to the fullest extent permitted by law, you agree to hold all Confidential Information (as defined below) in strict confidence, not to use it in any way, commercially or otherwise, except for purposes contemplated under the Initiative, and not to disclose it to others. You also agree to take all actions reasonably necessary to protect the confidentiality of all Confidential Information. As used herein, “Confidential Information” means: (i) any information, materials or knowledge regarding OISY, the Internet Computer ,the Foundation and its business, financial condition, products, programming techniques, customers, suppliers, technology or research and development that is disclosed to you or to which you have access in connection with participating in the Initiative and (ii) these Terms. Confidential Information will not include any information that: (a) is or becomes part of the public domain through no fault of you; (b) was rightfully in your possession at the time of disclosure, without restriction as to use or disclosure; or (c) you rightfully receive from a third party who has the right to disclose it and who provides it without restriction as to use or disclosure. Notwithstanding the foregoing, Confidential Information includes any information that, due to its nature or the circumstances of its disclosure, a reasonable person would know, or would have reason to know, should be treated as confidential.

9. Release and Indemnification. You agree to fully and finally release, indemnify, defend and hold the Foundation and its parent, affiliates, subsidiaries, directors, officers, employees and agents, including advertising and promotion agencies, and assigns, and any other organizations related to the Initiative, harmless from any and all claims, injuries, damages, expenses or losses to person or property and/or liabilities of any nature that in any way arise from participation in the Initiative, your Participant Materials or acceptance or use of a Reward, including without limitation (i) any condition caused by events beyond the Foundation’s control that may cause the Initiative to be disrupted; (ii) any injuries, losses, or damages (compensatory, direct, incidental, consequential or otherwise) of any kind arising in connection with or as a result of any benefit you may receive in connection with the Initiative, or acceptance, possession, or use of a Reward, or from participation in the Initiative; and (iii) any printing or typographical errors in any materials associated with the Initiative.

10. Limitation of Liability. NEITHER THE FOUNDATION NOR ANY OTHER PARTY INVOLVED IN THE ADMINISTRATION OF THE INITIATIVE WILL BE LIABLE FOR ANY INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES, INCLUDING LOST PROFITS, LOSS OF DATA OR GOODWILL, SERVICE INTERRUPTION, COMPUTER DAMAGE OR SYSTEM FAILURE ARISING OUT OF OR IN CONNECTION WITH THESE TERMS, WHETHER BASED ON WARRANTY, CONTRACT, TORT (INCLUDING NEGLIGENCE), PRODUCT LIABILITY OR ANY OTHER LEGAL THEORY, AND WHETHER OR NOT THE FOUNDATION HAS BEEN INFORMED OF THE POSSIBILITY OF SUCH DAMAGE, EVEN IF A LIMITED REMEDY SET FORTH HEREIN IS FOUND TO HAVE FAILED OF ITS ESSENTIAL PURPOSE. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES OR DAMAGES CAUSED BY GROSS NEGLIGENCE OR WILLFUL INTENT, SO THE ABOVE LIMITATION MAY NOT APPLY TO YOU. IN NO EVENT WILL THE FOUNDATION’S TOTAL LIABILITY ARISING OUT OF OR IN CONNECTION WITH THESE TERMS EXCEED FIFTY U.S. DOLLARs ($50.00). THE EXCLUSIONS AND LIMITATIONS OF DAMAGES SET FORTH ABOVE ARE FUNDAMENTAL ELEMENTS OF THE BASIS OF THE BARGAIN BETWEEN YOU AND THE FOUNDATION.

11. Termination. The term of these Terms commences from the date the Initiative begins and continues until (i) the completion of Participant’s participation in the Initiative or (ii) these Terms or the Initiative is terminated by the Foundation, whichever is earlier (the “Term”). For example, if for any reason the Initiative is not capable of running as planned due to unforeseen changes in business conditions, infection by computer virus, bugs, tampering, unauthorized intervention, fraud, technical failures, or any other causes which corrupt or affect the administration, security, fairness, integrity, or proper conduct of the Initiative, the Foundation reserves the right at its sole discretion to amend these Terms or cancel, terminate, modify or suspend the Initiative and terminate these Terms. The Foundation may also terminate these Terms for convenience upon ten (10) days’ written notice. Upon any termination, discontinuation or cancellation of the Initiative or these Terms, all provisions of these Terms which by their nature should survive will survive, including, without limitation, ownership provisions, warranty disclaimers, limitations of liability, and dispute resolution provisions.

12. Privacy Policy and Personal Information. Any personal information and Participant Materials submitted by you in connection with the Initiative will be used for the purposes described in these Terms and will otherwise be handled in accordance with the Foundation’s Privacy Policy, which may include processing or use by third parties solely within the scope of the Terms of this Agreement, located at https://DFINITY.org/privacy-policy/, and you acknowledge and agree to such use.

13. Assignment. You may not assign or transfer these Terms by operation of law or otherwise) without the prior written consent of the Foundation and any prohibited assignment will be null and void. The Foundation may assign these Terms or any rights hereunder without your consent. Subject to the foregoing, these Terms will bind and inure to the benefit of the parties’ permitted successors and assigns.

14. Miscellaneous. The Foundation is not responsible for transmission errors resulting in omission, interruption, deletion, defect, delay in operations or transmission, theft or destruction or unauthorized access to or alterations of Participant Materials, or for technical, network, telephone equipment, electronic, computer, hardware or software malfunctions or limitations of any kind, or inaccurate transmissions of or failure to receive entry information by the Foundation on account of technical problems or traffic congestion on the Internet or at any website or any combination thereof. The Foundation is also not responsible for injury or damage to your computer or any other damage resulting from any downloading of any materials in connection with the Initiative. In the event that any provision in these Terms is held to be invalid or unenforceable, the unenforceable part will be given effect to the greatest extent permitted by law and the remaining provisions will remain in full force and effect to the maximum extent permitted by law. The failure of a party to enforce any right or provision of these Terms will not be deemed a waiver of such right or provision. You agree that these Terms and the rules, restrictions and policies contained herein, and the Foundation’s enforcement thereof, are not intended to confer and do not confer any rights or remedies upon any person other than you and the Foundation. These Terms, any exhibits, and any other policies of the Foundation incorporated herein by reference constitute the entire agreement between the Foundation and you with respect to the subject matter of these Terms.

15. Governing Law; Dispute Resolution. These Terms will be governed by and interpreted in accordance with the laws of Switzerland excluding that body of law pertaining to conflict of laws. Any dispute, controversy, difference or claim arising out of or relating to these Terms, including the existence, validity, interpretation, performance, breach or termination thereof or any dispute regarding non-contractual obligations arising out of or relating to it shall be referred to and finally resolved by arbitration in accordance with the Swiss Rules of International Arbitration of the Swiss Arbitration Centre in force when the Notice of Arbitration is submitted in accordance with those rules. The law of this arbitration clause shall be Swiss law. The seat of arbitration shall be Zurich, Switzerland. The number of arbitrators shall be one. The arbitration proceedings shall be conducted in English.

16. Contact. If you have any questions about the Initiative or the Terms, please contact support@oisy.com.

IF YOU DO NOT AGREE TO THESE TERMS, PLEASE DO NOT REGISTER OR OTHERWISE PARTICIPATE IN THE INITIATIVE.

Receiving Tokens

To receive tokens into your OISY Wallet:

  1. Open your wallet and select the token you wish to receive.

  2. Click the “Receive” button.

  3. Your wallet address will be displayed—copy the address or scan the provided QR code.

  4. Share this address with the sender to receive tokens.

OISY Wallet’s on-chain architecture ensures full transparency in all transactions.