Userflow
UserFlow for Creating and Recovering a Wallet on MirrorWallet
Step 1: Wallet Creation
Goal: Allow the user to create a secure wallet without using a traditional seed phrase.
1.1 Download and Install MirrorWallet
Available on mobile (iOS/Android) and desktop (Mac/Windows/Linux).
1.2 Sign Up / Log In
Users can create an account (optional, for cloud backup) or proceed anonymously.
Authentication options: Biometric authentication (Face ID, fingerprint). PIN or password (in case biometrics fail).
1.3 Wallet Generation
A new cryptographic key pair is generated locally on the device.
The user does NOT receive a seed phrase.
1.4 Immediate Backup Prompt
The user is prompted to set up a recovery method.
Two options: Shamir’s Secret Sharing (SSS) Recovery (Recommended). Encrypted Cloud Backup (Optional, for convenience).
Step 2: Setting Up Recovery with Shamir’s Secret Sharing (SSS)
Goal: Ensure the user can recover their wallet if they lose access.
2.1 Choose Trusted Contacts
The user selects at least 5 trusted contacts (friends, family, or backup services).
Each trusted contact must accept their role (via email, QR code, or app notification).
2.2 Distribute Secret Shares
The wallet splits the recovery key into multiple encrypted shares using SSS.
Each trusted contact receives a unique share securely.
Example: 5 shares created, 3 needed for recovery (5/3 threshold).
2.3 Confirmation and Finalization
The user receives a confirmation that recovery is set up.
Option to replace a trusted contact or regenerate shares.
Step 3: Using MirrorWallet (Daily Operations)
Goal: Provide a seamless experience for transactions and wallet management.
3.1 Send & Receive Crypto
Standard wallet features for sending, receiving, and storing cryptocurrencies.
3.2 Security Alerts & Status
Users are notified if a trusted contact revokes their share or if a new share is created.
3.3 Manage Trusted Contacts
Users can update their recovery contacts at any time.
Option to revoke a contact’s share if they are no longer trusted.
Step 4: Wallet Recovery (If Access is Lost)
Goal: Allow the user to regain access if they lose their device or credentials.
4.1 User Requests Recovery
If the user loses their device, they initiate recovery mode.
The user must contact at least 3 out of 5 trusted contacts (or the required threshold).
4.2 Trusted Contacts Provide Their Shares
Each trusted contact uses MirrorWallet to send back their encrypted share.
Shares are verified and combined to reconstruct the private key.
4.3 Biometric or PIN Verification
A final identity verification step ensures the original user is requesting recovery.
This can be done via: Biometric scan (if previously registered). Security questions or email verification.
4.4 Wallet is Restored
The wallet is re-generated, and the user regains full control.
Option to update recovery contacts if needed.
Step 5: Security & Future Enhancements
Goal: Ensure the wallet remains secure and adaptable over time.
5.1 Periodic Recovery Check-Ups
MirrorWallet prompts users to verify if their recovery contacts are still valid.
If a contact is no longer available, the user is advised to update their recovery setup.
5.2 Emergency Failsafe (Optional Feature)
If no trusted contacts are available, the user can set up a time-locked recovery (e.g., access granted after 30 days of inactivity).
Conclusion
This roadmap provides a secure, seedless recovery process that eliminates the risks of losing a seed phrase while increasing engagement through trusted social recovery.
Last updated