Each method offers different advantages. Choose based on your security needs and technical comfort level.
Select 3-5 trusted contacts who can verify your identity through our web3 trust graph system.
Detailed comparison of all available recovery options
Select 3-5 trusted contacts who can verify your identity through our web3 trust graph system.
Your seed phrase encrypted client-side and stored securely with zero-knowledge architecture.
Backup access rights delegated to a smart contract with programmable recovery conditions.
Get started with your preferred recovery method in just a few simple steps
Select the recovery method that best fits your needs
Set up your recovery parameters and security preferences
Complete setup and activate your recovery system
• You can combine multiple recovery methods for enhanced security
• Always test your recovery process in a safe environment first
• Keep your recovery information updated and accessible
• Never share your recovery details with untrusted parties