Userflow

UserFlow for Creating and Recovering a Wallet on MirrorWallet

Step 1: Wallet Creation

Goal: Allow the user to create a secure wallet without using a traditional seed phrase.

1.1 Download and Install MirrorWallet

  • Available on mobile (iOS/Android) and desktop (Mac/Windows/Linux).

1.2 Sign Up / Log In

  • Users can create an account (optional, for cloud backup) or proceed anonymously.

  • Authentication options: Biometric authentication (Face ID, fingerprint). PIN or password (in case biometrics fail).

1.3 Wallet Generation

  • A new cryptographic key pair is generated locally on the device.

  • The user does NOT receive a seed phrase.

1.4 Immediate Backup Prompt

  • The user is prompted to set up a recovery method.

  • Two options: Shamir’s Secret Sharing (SSS) Recovery (Recommended). Encrypted Cloud Backup (Optional, for convenience).


Step 2: Setting Up Recovery with Shamir’s Secret Sharing (SSS)

Goal: Ensure the user can recover their wallet if they lose access.

2.1 Choose Trusted Contacts

  • The user selects at least 5 trusted contacts (friends, family, or backup services).

  • Each trusted contact must accept their role (via email, QR code, or app notification).

2.2 Distribute Secret Shares

  • The wallet splits the recovery key into multiple encrypted shares using SSS.

  • Each trusted contact receives a unique share securely.

  • Example: 5 shares created, 3 needed for recovery (5/3 threshold).

2.3 Confirmation and Finalization

  • The user receives a confirmation that recovery is set up.

  • Option to replace a trusted contact or regenerate shares.


Step 3: Using MirrorWallet (Daily Operations)

Goal: Provide a seamless experience for transactions and wallet management.

3.1 Send & Receive Crypto

  • Standard wallet features for sending, receiving, and storing cryptocurrencies.

3.2 Security Alerts & Status

  • Users are notified if a trusted contact revokes their share or if a new share is created.

3.3 Manage Trusted Contacts

  • Users can update their recovery contacts at any time.

  • Option to revoke a contact’s share if they are no longer trusted.


Step 4: Wallet Recovery (If Access is Lost)

Goal: Allow the user to regain access if they lose their device or credentials.

4.1 User Requests Recovery

  • If the user loses their device, they initiate recovery mode.

  • The user must contact at least 3 out of 5 trusted contacts (or the required threshold).

4.2 Trusted Contacts Provide Their Shares

  • Each trusted contact uses MirrorWallet to send back their encrypted share.

  • Shares are verified and combined to reconstruct the private key.

4.3 Biometric or PIN Verification

  • A final identity verification step ensures the original user is requesting recovery.

  • This can be done via: Biometric scan (if previously registered). Security questions or email verification.

4.4 Wallet is Restored

  • The wallet is re-generated, and the user regains full control.

  • Option to update recovery contacts if needed.


Step 5: Security & Future Enhancements

Goal: Ensure the wallet remains secure and adaptable over time.

5.1 Periodic Recovery Check-Ups

  • MirrorWallet prompts users to verify if their recovery contacts are still valid.

  • If a contact is no longer available, the user is advised to update their recovery setup.

5.2 Emergency Failsafe (Optional Feature)

  • If no trusted contacts are available, the user can set up a time-locked recovery (e.g., access granted after 30 days of inactivity).


Conclusion

This roadmap provides a secure, seedless recovery process that eliminates the risks of losing a seed phrase while increasing engagement through trusted social recovery.

Last updated