Recovery Methods

Choose the recovery method that best fits your security preferences and use case. Each option provides enterprise-grade protection with different trade-offs.

Compare Recovery Methods

Each method offers different advantages. Choose based on your security needs and technical comfort level.

Social Circle Recovery

DECENTRALIZED

Select 3-5 trusted contacts who can verify your identity through our web3 trust graph system.

Key Features

Decentralized verification
No single point of failure
Community-based trust
Cryptographic signatures
Setup Time
10-15 minutes
Recovery Time
2-24 hours

Advantages

Most secure against single points of failure
Community-driven verification
No central authority

Considerations

Requires trusted contacts
Coordination needed for recovery
Potential social engineering risks
Security Level
Medium
5/5

All Recovery Methods

Detailed comparison of all available recovery options

Social Circle Recovery

DECENTRALIZED

Select 3-5 trusted contacts who can verify your identity through our web3 trust graph system.

Setup Time10-15 minutes
Recovery Time2-24 hours
Complexity
Medium
Decentralized verification
No single point of failure
Community-based trust

Encrypted Cloud Backup

ZERO-KNOWLEDGE

Your seed phrase encrypted client-side and stored securely with zero-knowledge architecture.

Setup Time5 minutes
Recovery TimeInstant
Complexity
Easy
Client-side encryption
Zero-knowledge storage
Instant recovery

Smart Contract Delegation

ON-CHAIN

Backup access rights delegated to a smart contract with programmable recovery conditions.

Setup Time15-20 minutes
Recovery Time10-30 minutes
Complexity
Advanced
Programmable conditions
On-chain verification
Automated execution

Quick Setup Guide

Get started with your preferred recovery method in just a few simple steps

1

Choose Method

Select the recovery method that best fits your needs

2

Configure Settings

Set up your recovery parameters and security preferences

3

Activate Protection

Complete setup and activate your recovery system

Important Recovery Notes

• You can combine multiple recovery methods for enhanced security

• Always test your recovery process in a safe environment first

• Keep your recovery information updated and accessible

• Never share your recovery details with untrusted parties

Ready to Set Up Recovery?

Choose your recovery method and get protected in minutes with enterprise-grade security.