Show HN: 기억력을 잃으면 컴퓨터에 다시 액세스하려면 어떻게 해야 합니까?

Show HN: If you lose your memory, how to regain access to your computer?

389 pointsby eljojo2026. 2. 6.223 comments
원문 보기 (eljojo.github.io)

자전거 사고로 인한 뇌진탕 때문에 기억력을 잃고 다시 로그인할 수 없게 될까 봐 오랫동안 걱정했습니다.<p>Shamir의 비밀 공유(HashiCorp Vault 구현)와 Age 암호화를 결합하고 WASM을 사용하여 깔끔한 브라우저 내 오프라인 UX로 패키징했습니다.<p>아이디어는 제가 없어진 경우, 친구와 가족이 제가 가장 중요하게 생각하는 데이터에 다시 액세스할 수 있도록 도와줄 것이라는 것입니다. 7명의 친구 중 5명이 동의해야 Vault가 잠금 해제됩니다.<p>웹사이트의 데모를 사용해 보세요. 완전히 브라우저에서 실행됩니다!

Due to bike-induced concussions, I&#x27;ve been worried for a while about losing my memory and not being able to log back in.<p>I combined shamir secret sharing (hashicorp vault&#x27;s implementation) with age-encryption, and packaged it using WASM for a neat in-browser offline UX.<p>The idea is that if something happens to me, my friends and family would help me get back access to the data that matters most to me. 5 out of 7 friends need to agree for the vault to unlock.<p>Try out the demo in the website, it runs entirely in your browser!

요약

ReMemory는 Shamir의 비밀 공유를 사용하여 파일을 암호화하고 복호화 키를 분할하는 브라우저 기반의 오프라인 도구입니다. 사용자는 키 조각을 신뢰할 수 있는 친구들에게 분배하여 특정 임계값(예: 5명 중 3명)이 협력해야 데이터를 잠금 해제할 수 있도록 할 수 있습니다. 이를 통해 한 명의 개인도 민감한 정보에 액세스할 수 없도록 보장하며, 웹사이트가 없어도 복구가 가능합니다.

댓글 (231)

moltymolt2일 전
That's an interesting idea. It's a good solution to the problem of sharing all your passwords with your loved ones posthumously. Typically that'd involve keeping everything in a vault which will automatically be released to your person of choice if you failed to reset it. The annoying part is having to reset it indefinitely. I like your idea where you share it with multiple people in advance but they would have to collectively decide to unlock it.
eljojo2일 전
exactly! my hope is to offload some trust to the collective of my friends
ddtaylor2일 전
I suffered a traumatic brain injury (TBI) related to an e-bike accident two years ago. I woke up in the ICU after a short coma-like thing and the nurses/doctors asking me questions and it was clear I was answering for the 10th time or more, like we had all done this before, but I couldn't remember anything.

Thankfully my very long password I use for an encrypted Borgbackup I have was somewhere deep or untouched, but, otherwise I would have been fucked. Also, the backup codes Google told me they would always accept failed and it wasn't until I found a random unused Android device in a drawer that had been unused for a year was I able to get access back to my Google account of ~25 years.

ericbarrett2일 전
I also had old Google backup codes fail a few years ago. Anybody who hasn't regenerated them in a year or two, I recommend you do so.
eljojo2일 전
my stomach turned into a knot just reading your story. I know that feel of waking up surrounded by nurses not knowing what happened. I'm so glad you had proper backups!!!!!!!!!!

this exact story is why i built my app, thank you so much for sharing.

my hope is to basically make a next version of your plan that's distributed among friends.

lucb1e1일 전
Wow, it both surprises me but also makes me feel justified in that I keep telling people to make backups of things they care about including something like a Spotify account (if your song lists are dear to them, at least the titles and other metadata that they could rebuild from) and other "cloud" or SaaS services. Anything one cares about, back it up! (Not to you but as a PSA)

Still, it's weird that Google doesn't accept a recovery code. Then again, I had a similar issue where I had nothing set up but a recovery email address and password (back when 2FA was rare), and after confirming both, Google said "well, we still think it's suspicious, why don't you use a device where you're already logged in" (my account had no active sessions that I knew of, besides that I was traveling). Luckily I didn't need it for anything as I had my email moved away already at that time. I still can't access that account today and I switched to throwaway accounts for things like youtube comments or app downloads from the play store (need to download that government authentication software somehow...)

Did Google specifically reject the recovery code as invalid, or did it accept all entries and then their algorithm rejected the login outright?

modeless2일 전
For this purpose Google offers "Inactive Account Manager" AKA a dead man's switch.
couchdive2일 전
3 months of non-use is the lowest term available before it will enact. That's too long for most situations except maybe probate court
eljojo2일 전
I don't use Google :(
[삭제된 댓글]
bitexploder2일 전
Low tech: I put my secret manager password in a physical journal that is locked in a fire proof, water proof vault and hidden somewhere only my partner and myself know where it is. I use a password manager. Everything else goes in the password manager.
rcxdude2일 전
In general whatever kind of backup plan you have for when you die could also work in this scenario, you may just need to think harder about anything that you do not want have revealed when you die.
munk-a2일 전
Alternative - my partner and I (and also two other close contacts) have password managers that contain each of the other one's secret. This was less an effort to help with the memory loss scenario and more of an effort to deal with death and access to services (especially to cease subscriptions and the like).

In a lower trust scenario you could probably use a lawyer as a broker of the secret (potentially even as part of a will).

maurycyz2일 전
This. A physical safe provides something that you can't do digitally: It's hard, but not impossible to get in without credentials.

On the internet, it's either: Public for anyone in the whole world, or impossible to recover if anything goes wrong.

repiret2일 전
This is what I do too, but be warned about “fire proof” - a fire that results in the total loss of your house will create enough heat for enough time that fireproof gun safes and smaller fireproof lockboxes will be destroyed, or even if not, their contents will get hot enough to combust anyway.

A bank safe deposit box offers a different security profile that’s probably more robust against fire because banks burn less often than houses.

It’s probably not practical to really be robust against fire without being buried several feet deep.

eljojo2일 전
sometimes simpler is the best. I am always on the move so vaults don't jive well with me. my concern would be for something to still happen to it, too. I'm trying to go by the principle of not putting all my eggs on one basket.
tempestn1일 전
I'd advise sharing that knowledge with one trusted person outside your household too, especially if you and your partner have dependants.
lucenet2일 전
Write down the password, print out recovery codes. Store them in separate buildings.

Tell someone you trust about where you left these pieces of paper.

notepad0x902일 전
a safe-deposit box at a bank works ok too.
[삭제된 댓글]
registeredcorn2일 전
I explicitly make it so I cannot regain access to my computer in the event that my memory becomes faulty.

I would be in an impaired state, and cannot function in way that would be conducive to either work or pleasure in terms of computer use.

That is to say, the entire reason why I have password security at all is to keep out people who do not know the password. If someone does not know the password, they should not be able to access the system. That obviously and clearly applies to myself as much as any other person. "If you do not know it, then you do not need it."

esafak2일 전
No family, eh?
catlifeonmars2일 전
What if you forgot your password but retained all other memories?
saltcured2일 전
I agree in broad strokes. If I am incapacitated, that is when things like durable power-of-attorney, medical advance directives, and living trusts come into play.

The important thing is to ensuring your computer is not a single point of failure. Instead of losing a password, you could have theft, flood, fire, etc. Or for online accounts, you are one vendor move away from losing things. None of these should be precious and impossible to replace. I've been on the other side of this, and I think the better flow is to terminate or transfer accounts, and wipe and recycle personal devices.

A better use of your time is to set up a disaster-recovery plan you can write down and share with people you trust. Distribute copies of important data to make a resilient archive. This could include confidential records, but shouldn't really need to include authentication "secrets".

Don't expect others to "impersonate" you. Delegate them proper access via technical and/or legal methods, as appropriate. Get some basic legal advice and put your affairs in order. Write down instructions for your wishes and the "treasure map" to help your survivors or caregivers figure out how to use the properly delegated authority.

BoredPositron2일 전
Yubikey
nippoo2일 전
This kind of thing, widely implemented, would be a game-changer for dealing with assets after someone's death! I maintain my family's IT infrastructure (Google Enterprise admin, webserver etc) and I've been tempted to write down 1/4 of my password manager root password and give it to each of my family members - but then we run into the problem where if any one of them loses their shard, it's unrecoverable. Some kind of ECC would be great - ideally where I could print it out onto various bits of paper with a user-definable redundancy, or better still, some kind of reciprocal system where (say) 8/10 members of a trusted friend group/family ring could unlock any other member's password...
rcxdude2일 전
Shamir secret sharing is the cryptographic thing that you want. You can can configure any M of N to be needed to recover the underlying secret.

(If you have a trusted third party, you can also enforce a cooling off period: e.g. that any attempt to access results in a notification to the account holder that if not denied within some time period, access is granted)

nandomrumber2일 전
You can give your password, or part of it, to your estate lawyer to attach to your will.

This is obviously more cumbersome, and probably costly, if you intend on changing your password. I guess you could change the part of it you don’t store with them.

eljojo2일 전
yes! I am starting to do some planning on that myself, that's why I'm in that kind of mindset. If you know more people in this space, please share this with them! would love to get feedback
tmpfs2일 전
We care about this porblem and are actively working on it, like the OP we also settled on shamirs secret sharing with a time lock mechanism.

However, there is still the issue of the service provider going offline or out of business which we don't have a solution for yet.

We have started with a good password manager and will be adding digital inheritance/social recovery soon! [0]

Take a look, thoughts and feedback welcome.

[0]: https://saveoursecrets.com

ezwoodland1일 전
Something along the lines of reed-solomon codes could work for you:

If you want to share your password with M family members such that you only need N to agree to recover the original:

Split your password into ordered chunks.

Make a polynomial p, of power N where the p(1) = chunk1, p(2) = chunk2, ...

Evaluate the polynomial at M other points: p(N+1),p(N+2)...

Gives those M new points to your family along with their index (+1,+2,...).

If less than N family members get together, they will not be able to figure out the password much better than guessing. If N get together, they can interpolate their points to form the unique polynomial which will match p. Then evaluate p at p(1),p(2),... to get your original password.

If you put the whole password into 1 chunk, and pad the polynomial with random extra coefficients or points to make the polynomial of sufficient degree, then they get literally no information on the password without having at least N cooperate. If you make multiple chunks then they can do a little correlation between the chunks without knowing the whole thing.

This is sufficiently simple you can even work this out by hand without a computer, though it would be somewhat tedious.

gomox1일 전
Don't worry even if your heirs have the password, it's extremely likely that Google will find the login attempts "suspicious" and try to verify your identity by sending SMS codes to a phone number you last had in 2005, despite your best attempts to prevent it.
lucb1e1일 전
A quarter of your password manager's password means it needs to be really long for it to not be bruteforceable if one or two quarters are recovered (on the order of at least 24 completely random alphanumeric characters)

Shamir's secret sharing scheme does not allow anyone to bruteforce it, no matter if they have 99 out of the 100 required pieces that unlock a 10-character password. If you want to do this sort of thing, I would recommend using a secret sharing scheme instead

cyphar1일 전
There are much better systems for splitting data than just chunking it into N chunks, the most common is Shamir Secret Sharing[1] (the main benefit being that you can construct an M-of-N scheme easily and having N-1 shards provides you zero information about the secret). One word of caution -- a lot of software developers get enamored by the idea of information-theoretic security when they first run into it, but you eventually realise that useful applications of tools like SSS are actually quite rare.

Shameless plug: I wrote a project a few years ago to create PDF-based backups with sharded keys which would do exactly what I suspect you want[2], unfortunately I got stuck at the "make a nice UI for it" stage (everything works but it's just a CLI tool at the moment). I guess I should take a look at using an LLM for that these days... (I used this to store my password manager root password and necessary keys to pull and decrypt the encrypted backups of my server.)

[1]: https://en.wikipedia.org/wiki/Shamir%27s_secret_sharing [2]: https://github.com/cyphar/paperback/

JTbane2일 전
master password on paper hard copy
eljojo2일 전
that's so scary though! what if someone has access to it? or it gets lost when you need it?
rawgabbit2일 전
For my personal passwords, I use Apple's password manager. It lets me share passwords with my family. I also created a folder on Apple's iCloud that I share.

https://support.apple.com/guide/iphone/share-passwords-iphe6...

https://support.apple.com/guide/icloud/share-files-and-folde...

politelemon2일 전
Despite the convenience factor, it isn't great to use a manager tied into your own ecosystem. It should exist outside, with the minor factor of lesser convenience.
eljojo1일 전
I've been so tempted to try out the apple password manager, I'm fully vested in their ecosystem, but the lock in is too big for me to feel comfortable with.

This is the sort of stuff that terrifies me https://hey.paris/posts/appleid/

croisillon2일 전
i thought 3M had already invented the best password safe ;)
ddtaylor2일 전
I think 3M also sells a $5 wrench.
eljojo1일 전
lol i'm so neurodivergent i had to read this 5 times to understand 3M didn't just get into the encryption business
cbabraham2일 전
eljojo2일 전
no way!!!! I searched for a long time for a solution like this, many could encrypt using shamir but none took an actual file with browser upload and easy UX. and like, 14 years ago? my hats down to you my friend.

my zip bundles are 1-2 megabytes due to all the wasm, and you achieved this on so little. impressive job!

I'd love to hear what you think about mine, one of the differences is that it creates a ZIP file containing the recovery app in it, as well as a PDF with instructions for non-technical friends. Overall trying to make the recovery experience as smooth as possible.

but cheers, your version is the only one that I found that does basically what mine does, all the others fall short one way or another!

econ2일 전
I like it. Perhaps you can use a weird idea of mine.

You can discard/modify part of a password before sending it to your backend. Then, when you log in the server has to brute force the missing part.

One could extend this with security questions like how many children pets and cars you own. What color was your car in 2024. Use that data to aid brute forcing.

The goal would be to be able to decrypt with fewer than 5 shards but make it as computation heavy as you like. If no one remembers the pink car it will take x hours longer.

eljojo2일 전
ohhhh that's brutal haha! for context my app runs entirely clientside, but I get it, it's an interesting idea...
ImPostingOnHN1일 전
That is a neat take on "key strengthening", or "peppering":

https://crypto.stackexchange.com/questions/20578/definition-...

lucb1e1일 전
That sounds like a roundabout way of doing security questions... https://security.stackexchange.com/questions/186297/do-secur...
digiown1일 전
This makes little sense, IMO. Information is information. There is no difference between this and just having a short/simple passphrase with the PKBDF iterations turned very high. You might as well shard secrets using Shamir and encode it via a modified version of BIP32 words.
cedws2일 전
I also gave this problem some thought: https://github.com/cedws/amnesia
eljojo2일 전
oh hey, nice timing! good name too, I see we're both on the same wavelength there. I'll link you from my readme!
gingerlime2일 전
Other than passwords though, I also have stuff installed at home on a Synology NAS, a mail server, a VPS running some websites (my own, family, my wife's), Home Assistant, Family photos with backups etc etc.

I wonder who would not only have the passwords, but the know-how to manage the whole thing, at least to transition it to more managed services...

thephyber2일 전
Don’t assume that anyone can.

If you want someone to be able to access it after you’re gone, either put 1000 BTC in it or leave instructions. Paper instructions in a physical fireproof safe is way easier to deal with than any digital encryption with no hints.

eljojo2일 전
you're completely right! the app actually guides you on some of that, it generates a readme that gives you advise on what to document, but I agree you can't be too careful here, the passwords IS NOT ENOUGH.

You need to give people "a map" of where things are: https://github.com/eljojo/rememory/blob/main/internal/projec...

reddalo2일 전
Me too. I'm starting to self-host more and more services for both me and my family, and I wonder what would happen should I meet a bus in a front-facing way.
Terr_1일 전
I think that boils down to having a checklist addendum to go with your will, an outline of accounts and data to rescue.
rkagerer2일 전
Nice! Good to see some tooling in this space explicitly designed for simplicity and user-friendliness.

One practical problem to consider is the risk of those distributed bundles all ending up on one or two major cloud provider's infra because your friends happened to store them someplace that got scooped up by OneDrive, GDrive, etc. Then instead of the assumed <threshold> friends being required for recovery, your posture is subtley degraded to some smaller number of hacked cloud providers.

Someone using your tool can obviously mitigate by distributing on fixed media like USB keys (possibly multiple keys to each individual as consumer-grade units are notorious for becoming corrupted or failing after a time) along with custodial instructions. Some thought into longevity is helpful here - eg. rotating media out over the years as technology migrates (when USB drives become the new floppy disks) and testing new browsers still load up and correctly run your tool (WASM is still relatively new).

Some protocol for confirming from time to time that your friends haven't lost their shares is also prudent. I always advise any disaster recovery plan that doesn't include semi-regular drills isn't a plan it's just hope. There's a reason militaries, first responders, disaster response agencies, etc. are always doing drills.

I once designed something like this using sealed paper cards in identified sequence - think something like the nuclear codes you see in movies. Annually you call each custodian and get them to break open the next one and read out the code, which attests their share hasn't been lost or damaged. The routine also keeps them tuned in so they don't just stuff your stuff in an attic and forget about it, unable to find their piece when the time comes. In this context, it also happens to be a great way to dedicate some time once a year to catch up (eg. take the opportunity to really focus on your friend in an intentioned way, ask about what's going on in their life, etc).

The rest of my comments are overkill but maybe fun to discuss from an academic perspective.

Another edge case risk is of a flawed Shamir implementation. i.e. Some years from now, a bug or exploit is discovered affecting the library you're using to provide that algorithm. More sophisticated users who want to mitigate against that risk can further silo their sensitive info - eg. only include a master password and instructions in the Shamir-protected content. Put the data those gain access to somewhere else (obviously with redundancy) protected by different safeguards. Comes at the cost of added complexity (both for maintenance and recovery).

Auditing to detect collusion is also something to think about in schemes like these (eg. somehow watermark the decrypted output to indicate which friends' shares were utilized for a particular recovery - but probably only useful if the watermarked stuff is likely to be conveyed outside the group of colluders). And timelocks to make wrench attacks less practical (likely requires some external process).

Finally, who conducted your Security Audit? It looks to me as if someone internal (possibly with the help of AI?) basically put together a bunch of checks you can run on the source code using command line tools. There's definitely a ton of benefit to that (often the individuals closest to a system are best positioned to find weaknesses if given the time to do so) and it's nice that the commands are constructed in a way other developers are likely to understand if they want to perform their own review. But might be a little misleading to call it an "audit", a term typically taken to mean some outside professional agency is conducting an independent and thorough review and formally signing off on their findings.

Also those audit steps look pretty Linux-centric (eg. Verify Share Permissions / 0600, symlink handling). Is it intended development only take place on that platform?

Again, thanks for sharing and best of luck with your project!

2color2일 전
I like that more people are thinking solving some of the problems of digital inheritance we face. These are problems that are so important now that so much of our lives are digital and tapping into ones actual social circle seems the best way to do this.

Also, kudos for packaging it as a static web app. That's the one platform I'm willing to bet will still function in 10 years.

lucb1e1일 전
As someone who still plays Windows games from 30 years ago and Flash games from ~20 years ago, I'd not be so pessimistic about other platforms, at least when there is no negative sentiment towards it and a good track record of stability. Not to say that the web is not among the best choices
mikkupikku2일 전
I'm a firm believer in passwords on sticky notes.

(At home of course, people get pissy if you do this at work!)

Yodel09141일 전
We use Vaultwarden and Bitwarden to share passwords with the family. My wife has my master password and I have hers.

The bigger issue if I drop dead is all the nontrivial tech crap I have set up (self hosted Vaultwarden included…).

karussell1일 전
Honest question: what is the benefit of such a specialized service compared to just an encrypted file with all your passwords that you share via some common file sharing service (hosted or self-hosted)
rektlessness1일 전
As our identities get more fragmented across devices, clouds, and cranial volatility, I expect digital wills that withstand real-world decay to become the norm.
kzalesak1일 전
Thank you for this tool. We have been looking at shamir schemes in our org for encrypting backup, and decided against it for the reasons of being too complicated. Maybe it is time to revisit it again.
Terr_1일 전
The "lost my memory" scenario differs a bit from death/succession planning in that you can use biometrics... but IMO it's better to jump straight to the latter and concuss two birds with one stone.
octoberfranklin1일 전
Shamir Secret Sharing is notoriously difficult to implement correctly, and even the smallest most subtle bugs result in total compromise.

Consider whether you really need this.

Doing 7-choose-5 separate multiparty encryptions is way harder to screw up. Is having to produce 42 ciphertexts really a dealbreaker?

kortex1일 전
They are using the Hashicorp Vault implementation, and it's been around for years. I think we can safely say they know what they are doing.
aforwardslash1일 전
5 out of 7 means you cannot be in an eg. car accident with more than 2 of them at a time, if there is the possibility of all of them present in the car not surviving.

Im also quite more practical - there are responsabilities that may go beyond a simple memory loss - eg. If one is in a coma or just hospitalized for a long period of time; trusted third parties may require access to your accounts even for simple stuff like paying bills/rent/cloud services.

Joel_Mckay1일 전
Dead man's switch doesn't necessarily mean the operator has expired

https://en.wikipedia.org/wiki/Dead_man's_switch

They are an important feature in autonomous systems, critical equipment, and deterrents. =3

mhb1일 전
Step 1. Get 7 friends
ShrootBuck1일 전
I have to say, this is a very cool project, and I love how everything you need is packaged up nicely for distribution
crazygringo1일 전
TouchID is a good starting point... though it does confirm your password weekly.

Somewhat tongue-in-cheek, but if I lose my memory, how am I supposed to remember the 7 (or 5) friends who have my password...?

Somewhat less tongue-in-cheek, if you really wanted to be serious about your friends not being able to produce your password now for the lolz, then you'd actually want to ensure they were merely acquaintances who didn't know each other and couldn't find each other, e.g. not all Facebook friends. In which case the list of friends becomes essentially as important as the password, and then how do you remember where you've stored that list?

In reality, hopefully you can just entrust your master password with your closest family (spouse, parent, adult children), assuming they're not going to drain your bank account or read your private digital journal.

unbad5051일 전
I just keep my password manager password hidden in a journal
[삭제된 댓글]
0gs1일 전
sorry if i missed this question. how do you remember you have this vault?
eljojo1일 전
i tell my friends about it, so they remind me in case I lose my memory
0gs1일 전
sorry if i missed this elsewhere: how do you remind yourself this vault exists? do you have to explain the whole thing to your 7 lifelines?
Brajeshwar1일 전
Start treating the Future-You like a Stranger. Write for that stranger, your Future-You will thank you. We think we will remember, but we won’t. So, don’t be too harsh on yourself and make it easier for your future-you. If that stranger finds it easier, it will also be for others; your relatives, kids, etc.

Unless your work and life need to be very secretive, or involve matters of national or international importance, I personally think a simpler printed/written format that works without electronics/Internet would be a better option. Of course, the printed details can have simple encryption, which your family/friends can break using day-to-day quirks you shared, such as the family secret codes, the name of that pet in the town you grew up in, or the middle name from the story of your great-grandfather, etc.

Some time ago, my mother-in-law (erstwhile teacher) and my godmother-aunty (businesswoman) began to forget many things. Their kids have tried quite a few phone apps and whatnot with electronics. Finally, I have suggested enforcing just two things: a lot of Valet bowls around the house (at common places in all the rooms) and pocket notebooks with pens attached. They just write anything and everything, from money to kitchen items to anything they want. If they forgot something, refer to the notebooks. If a key is lost, try the Valet Bowl. Now, my plan is to train their muscle memory to drop/pick from the bowl (don’t try to remember) and write things down.

The idea of Valet Bowls comes from something someone mentioned on Hacker News.

cyode1일 전
This comment right? https://news.ycombinator.com/item?id=41220059

(Funny how I can remember this comment from many months ago after never implementing the bowls, but I currently can’t remember where my car keys are. Should have implemented the bowls…)

hoppp1일 전
I talk to future me in code comments all the time and future me really appreciates past me for doing that.

Thank you past me for thinking about future me. Present me happy.

seized1일 전
Look at Bitwardens Emergency Access:

https://bitwarden.com/help/emergency-access/

Would also cover banking details or whatever else you want to put in there.

csullivannet1일 전
> Trusted emergency contacts must be existing Bitwarden users

While the motivation is similar this basically kills the feature. It requires that your friends not only use but continue to maintain their accounts.

From my understanding of OP's implementation, being completely offline they can basically just keep the key on a USB or file store of any kind.

Personally I think the most robust solution is single key access (a la emergency kit), distributed in one or more secure bank vaults for redundancy (many still do offer these for free or cheaply for small boxes). Put instructions in your (living) will and done.

KevinChasse1일 전
Interesting approach. I like that this is explicit about human recovery rather than pretending crypto alone solves catastrophe. That said, this design and fully stateless systems like mine (deterministic derivation, no escrow) are solving opposite failure modes. Shamir-based social recovery assumes: trusted third parties remain reachable, they are willing and able to cooperate, and that recovery is an exceptional event. Stateless systems assume the inverse: no one can be relied on, recovery is impossible by design, and the primary threat is silent compromise rather than lockout. Neither is “better” universally; they’re value judgments. What I appreciate here is that the tradeoffs are made explicit instead of buried behind UX. One open question I’d be curious about: how you reason about coercion risk over time (friends change, incentives change), and whether you see this as something users should periodically re-shard as relationships evolve.
eljojo1일 전
thanks for your thorough review and congrats on your launch! for my personal use case, I'm not worried about coercion, but many have highlighted it as a real risk. my answer to that is to do what you suggest: update my contact list yearly, send new ZIP files with bundles, and ask them to delete the previous ones.
joeframbach1일 전
Waterluvian1일 전
eljojo1일 전
great story :')
utopiah1일 전
Ah, I actually did something similar years ago. I basically hashed individual pages of my wiki and I think I published the hash of hashes on the Blockchain. Anyway I didn't need it and stop maintaining that system but definitely interesting explorations.

To clarify the hashing was to verify that the pages were indeed modified by me, to prevent tempering.

Damn, found it back, was in 2011!

in English https://fabien.benetou.fr/Slideshows/MemoryLoss

in French https://fabien.benetou.fr/Slideshows/MemoryLossPES

utopiah1일 전
FWIW as I commented just earlier if you have to verify without relying on memory nor a public note (e.g. sticker on screen) that others could use to pollute your data then use a biometric mechanism, e.g. YubiKey Bio.
procaryote1일 전
A lower tech version would be to pick a very long recovery passphrase, cut it in two or three and give it to two or three friends. It doesn't give you N out of M, but it will be good enough for a lot of real world scenarios
konha1일 전
I don’t know. Depending on how much time passes between now and the moment you try to recover the key I bet at least one of your friends will have misplaced or lost that piece of paper.
sjducb1일 전
This could be a useful tool for putting self hosted Bitcoin in a will.

If you self host then die no one can access your coins. Lawyers don’t want to be trusted with copies of secret phrases because of liability if the bitcoin gets stolen. If you encrypt the bitcoin recovery info across several files you can give part to the lawyer and part to different beneficiaries.

nesk_1일 전
I've been searching for a solution to let my wife have access to my master password if I die someday. This is definitely something that could work, thank you!
trueismywork1일 전
Very cool, but I must say the best way is still a paper with master password in a bank locker. May be distributed it if needed gor additional security.
yieldcrv1일 전
> 5 out of 7

too high

mjanx1231일 전
A sticker with your password to the monitor, like everybody else
fragmede1일 전
That's stupid! I put mine under the keyboard. Way more secure :p
utopiah1일 전
At least if you go that route use a biometric authentication mechanism, e.g. YubiKey Bio.
generic920341일 전
I personally do not really care if my relatives are able to access everything I was able to access once I am dead or forget everything. But they should be able to access anything of monetary worth.

So, without any crypto my belongings are either real estate or depots and accounts at banks. Both can easily be discovered in case of my death. I think there is a similar discovery process if I am subject to guardianship (permanently).

scaradim1일 전
goal for the rest of your life: prepare and leave after your death more that real estate and bank accounts to your relatives and friends.
kunley1일 전
The idea is very noble.

In am just thinking about the number of 5, who these times has really five trustable friends not just acquaintances or people bound by some specific activity perishing over time. I am afraid, for most people in the digital era this number is much lower (and I am certainly not speaking for myself now).

eljojo1일 전
"who has five friends?" has been the number one comment I've received on this, by far. a bubble just popped for me
fruitworks1일 전
What technique did you use for the timelock encryption?
eljojo1일 전
I don't have timelock encryption, but have been looking into integrating https://docs.drand.love/docs/timelock-encryption/#use-cases
commandersaki1일 전
We need a standard or reference for an SSS combined encryption mechanism. It definitely has value, but I don't think anyone will trust a single lonesome implementation no matter how good it is.
[삭제된 댓글]
meander_water1일 전
Seems similar to a Show HN from 5 years ago: https://news.ycombinator.com/item?id=26256726

I gotta say Horcrux is a catchier name ;)

nmstoker1일 전
Definitely catchier name!
kortex1일 전
Until you get sued by JK Rowling. Unlikely? sure, but I wanted to decouple for other reasons.

That's why i went with PassCrux for mine. Can't argue that it's too close, since "crux" is just latin for cross, as in "crux of the matter" (JK likely invented horcrux as a portmanteau of horror + crux).

https://github.com/xkortex/passcrux

nubinetwork1일 전
If you're not encrypting your hard drive, cracking a local Windows password is easy... Linux is even easier, but you just need a livecd to get back in either way...

Online accounts on the other hand... I hope you used something like lastpass. :)

Honestly, anything more than this is completely overkill.

graemep1일 전
That is why you should be encrypting your hard drive. You do not want it to be that easy.
mdavid6261일 전
Sticky notes?
vladde1일 전
then your friends conspire together against you and gain access to your system on their own /j
giantfrog1일 전
This system introduces a fun question: What’s more likely, that you suffer total spontaneous memory loss or your best friends betray you?
Schmerika1일 전
I think you'd have to plot a curve based on the potential reward of betrayal... I suspect that many Americans* would have their 5th closest friends committed or worse for low 6 figures. If in ~dire straits, as about half all Americans are, that number could get much lower.

* If my use of the word 'Americans' above is triggering, feel free to substitute it with 'people'.

ck21일 전
not just illness but age too will "bitrot" your brain

fifteen years ago I decided to fiddle around one winter and learn a newfangled thing called "bitcoin" and setup my computer to run 24/7 and heat my apartment as a benefit

after mining a dozen coins which were worth next to nothing then, I gave up and took apart the PC and put it away

fast-forward to 2020 and covid/long-covid has now rotted my brain, swiss-cheesed my mind to the point I cannot remember the password for the life of me

I was too clever then for future me, and used a long passphrase that made funny sense then but beyond me now

(they are worth over a million dollars at times now)

In hindsight:

go find a book in your library and pick a random page and write the password or a significant hint to the password on that page and then put it away (don't put any other indication on that paper)

vulcan011일 전
Libraries get rid of books in poor condition and loan books to other libraries, and patrons regularly fail to return books.
knifeinhead1일 전
Unfortunately, for this to work, you need friends...
[삭제된 댓글]
notesinthefield1일 전
Things like biometrics and hardware keys make this an easy fix - were they a consideration?
kube-system1일 전
If you are preparing for accidents where memory loss might be an issue you might also want to consider that you could quickly be in a situation where:

* you forget that you have a clever password scheme

* you forget that you have data to decrypt

* your mental capacities are deteriorated enough that someone else takes over decisions making for you. This person may not know you or your data protection scheme.

* you are physically injured where biometrics are non functional. Or a biometric system with a limit on tries may have been tripped by those trying to help you.

* you were in an incident that your friends/family were also affected by

In my opinion, the best way to protect against these is simply write stuff down in plaintext somewhere that relies on physical security, like with documents in your home. Also notate what they are and why someone would need to access them and how.

kortex1일 전
That's why you have a public-ish recovery guide for all the other steps.
rodolphoarruda1일 전
My family members know of my physical "red notebook" and its location. It has instructions on how to access my digital life on detail.
kortex1일 전
Glad to see this idea getting traction!

Had the same idea years ago (same hashicorp lib too) but lost motivation to polish it to the point I felt confident enough to Show HN. https://github.com/xkortex/passcrux

But given recent events, I want to restart work on it.

My use-case revolved more around preserving a master password e.g. to a password manager. I also wanted to support self-hosted backup, like hiding shares and giving directions to the parts to trusted friends. The shamir sharing part was straightforward but i really want to add forward error-correction to protect against partial data loss.

xtiansimon6시간 전
Interesting. Very useful _in the event of my untimely demise_.

Specifically for my own memory problem I use a printed "random number pad" that is a 10x10 grid of characters. I keep a copy in the house and in the cloud.

I have a strong visual memory. I can remember shapes and images much better than words or strings. To reveal the password I need only recall the visual pattern and collect the characters underneath.

Barry9874시간 전
I Invested $50,000 and reinvested it for 3 days and the money got up to $102,213. I told them that i wanted to withdraw. They told me i have to Pay 20% of my money before I can withdraw, I paid it and the following day, i wanted to withdraw and they told me i have to pay additional $40,000 . I told them i will not pay any money again, and that was how it ended. I taught they had gone with my money until I came across COIN HACK RECOVERY whom many had reviewed how they helped them recovered their stolen bitcoin and funds, I contact them on coinhackrecovery (at) gmail dot com I gave them a try and the outcome was epic! They helped me recover all my stolen bitcoins within 48 hours.