How it Works

How It Works

This section details the different ways you can generate your Solana vanity address using Cloud Vanity, along with important information about security and managing your requests.

Generation Methods

Local Generation

In this mode, the address generation process runs entirely within your web browser using your computer's processing power. Your keys are generated and remain local to your machine – nothing is sent to our servers.

Pros:

  • It's completely free.

  • Offers maximum privacy as keys never leave your browser.

Limitations:

  • Performance is entirely dependent on your computer's CPU.

  • Generating patterns longer than 5-6 characters can take a very long time (potentially days, weeks, or even months on average consumer hardware).

  • The browser tab must remain open and active during the generation process.

> START LOCAL GENERATION

Cloud Generation

For more complex or longer patterns, Cloud Generation utilizes our powerful server infrastructure to significantly speed up the process. This offloads the computational burden from your local machine.

Pros:

  • Significantly faster generation times for longer patterns.

  • You can close your browser or turn off your computer once the request is submitted. We handle the compute resources.

Details:

  • This is a paid service, with costs based on the length and complexity of your desired pattern.

> VIEW PRICING | > START CLOUD GENERATION

Privacy & Security (Cloud Generation)

Your security is paramount. For Cloud Generation, we employ a unique encryption process to ensure we never have access to your private key in an unencrypted form.

Here's the process:

  1. You submit your pattern request and provide a Secret on the Generator page. This secret is only known to you.

  2. Our servers generate potential Solana keypairs. When a public key matching your pattern is found, the corresponding private key is immediately encrypted using the Secret you provided via a symmetric encryption method (like XOR).

  3. CRITICAL: Our servers DO NOT store your Secret or the unencrypted private key. The secret is used transiently for the encryption process and is not logged or saved.

  4. The encrypted private key is then sent to you via email (or made available for download).

  5. To get your usable private key, you must go to our Decrypt page and use the exact same Secret you provided during the request. Only your secret can unlock the encrypted key.

This process ensures that even if our systems were compromised, your unencrypted private keys would remain secure as they are never stored on our servers.

You are the sole custodian of your Secret and the only one who can decrypt your private key.

Checking Status

For Cloud Generation requests, you can track the status of your request on the Status page. You can search using your email address, request ID, wallet address, or payment transaction signature.

Decrypting Your Key

Once your Cloud Generation request is completed and you receive your encrypted private key (usually via email), you can use the Decrypt page. Simply paste the encrypted key and enter the Secret you used during the request. The page will then provide you with the unencrypted private key, ready to be imported into your Solana wallet (like Phantom).

Conclusion

Cloud Vanity is designed to make obtaining a custom Solana address efficient and secure. Whether you choose the free Local Generation or the faster Cloud Generation, your privacy and the security of your keys are our top priority. By decentralizing the compute and encrypting keys with a user-controlled secret, we aim to provide a trustworthy service for the Solana community.

Need help? Contact us at [email protected]

Last updated