Safe & secure Keep Network wallet
Take control of your Keep Network assets with complete confidence in the Trezor ecosystem.
- Secured by your hardware wallet
- Use with compatible hot wallets
- Trusted by over 2 million customers

Send & receive your Keep Network with the Trezor Suite app
Send & receive
Swap
Trezor hardware wallets that support Keep Network
Sync your Trezor with wallet apps
Manage your Keep Network with your Trezor hardware wallet synced with several wallet apps.
Trezor Suite
MetaMask
Rabby
Supported Keep Network Networks
- Ethereum
- Harmony Shard 0
- Energi
Why a hardware wallet?
Go offline with Trezor
- You own 100% of your coins
- Your wallet is 100% safe offline
- Your data is 100% anonymous
- Your coins aren’t tied to any company
Online exchanges
- If an exchange fails, you lose your coins
- Exchanges are targets for hackers
- Your personal data may be exposed
- You don’t truly own your coins
How to KEEP on Trezor
Connect your Trezor
Install Trezor Suite

Transfer your KEEP

Make the most of your KEEP
Trezor keeps your KEEP secure
- Protected by Secure Element
The best defense against both online and offline threats
- Your tokens, your control
Absolute control of every transaction with on-device confirmation
- Security starts with open-source
Transparent wallet design makes your Trezor better and safer
- Clear & simple wallet backup
Recover access to your digital assets with a new backup standard
- Confidence from day one
Packaging & device security seals protect your Trezor’s integrity
A keep is an off-chain container for private data. Keeps help contracts harness the full power of the public blockchain — enabling deep interactivity with private data.
Keep Network aims to provide an off-chain “containers” — called keeps — that should keep private data safe from the public blockchain, thereby enabling smart contracts to maximize the full potential of blockchain tech without compromising on transparency or privacy. Keeps will be used to encrypt and store private data, and the keeps are to be protected by secure multi-party computation (sMPC) that allows generating, storing, encrypting and transmitting of data among different users.