@securopean Take a look at the Mathematical Mesh. It is an infrastructure whose primary purpose is to manage private keys across multiple devices. It uses novel threshold cryptography to allow for a seamless user experience.
The credential vault is end-to-end encrypted and only the user's endpoints ever have decryption capability.
The system is designed to be resistance to certain types of supply chain manipulation of devices. It takes multiple compromised for any breach to occur.
It is all open source and open specification and no proprietary service either. Open as in open.