Account Security
How your account is protected — and what you are responsible for
Hilo is designed to be decentralized and non-custodial. This means we do not hold your passwords, private keys, or login credentials.
Your account security is fully under your control.
How Hilo Accounts Work
Hilo uses Privy, a third-party authentication provider, to create accounts with zero friction.
You can sign in using:
Google
X (Twitter)
Telegram
Your crypto wallet
You simply choose your preferred method and log in.
Hilo never sees, stores, or controls:
Your passwords
Your private keys
Your login credentials
Your recovery methods
Important: Your Responsibility
Because Hilo does not custody your credentials:
You are fully responsible for securing your login method
Anyone who can access your Google, X, Telegram, or wallet can access your Hilo account
If your login method is compromised, your Hilo account is also compromised
This is what makes Hilo more decentralized — we cannot control who accesses your account, and we do not want to.
What Hilo Does NOT Store
To be 100% clear:
We do NOT store:
Passwords
Private keys
Recovery phrases
Wallet seed phrases
Social login credentials
We cannot see them. We cannot reset them. We cannot recover them.
How to Secure Your Login Methods
Since your Hilo account depends on your login provider, it’s important to secure them properly.
Securing a Crypto Wallet
If you use a crypto wallet to log in:
Never share your private key or seed phrase
Store your recovery phrase offline
Use a hardware wallet if possible
Do not connect your wallet to unknown websites
Beware of phishing links
Use wallet password protection
Anyone with your private keys can access your Hilo account.
Securing Google, X, Telegram, and Email
If you use social or email-based login:
Enable 2-factor authentication (2FA)
Use a strong, unique password
Do not reuse passwords across platforms
Avoid clicking unknown links
Watch out for fake login pages
Secure your email account first (it controls resets)
If someone gains access to these, they can also access your Hilo account.
What to Do If Your Account Is Compromised
If you believe your account has been accessed by someone else:
Secure your login provider immediately (Google, X, Telegram, or wallet)
Change your passwords or revoke sessions
Contact the provider’s support team
Then contact Hilo support to inform us
Because we do not hold your credentials, you must contact the login provider first.
Why Hilo Is Built This Way
This design makes Hilo more:
Decentralized
Trust-minimized
Privacy-preserving
Resistant to centralized breaches
We cannot see your credentials. We cannot misuse them. We cannot leak them.
And we don’t want to.
Final Notes
Hilo is not responsible for compromised third-party accounts
You control your access
You control your security
You control your recovery
If you need help or guidance, our support team is always available.
Last updated
Was this helpful?