The open-source protocol that separates cloud storage and private keys for simple and secure hot wallet backup.Self-custody represents one of the foundations of financial sovereignty made possible by Bitcoin. This concept is based on the well-known principle “not your keys, not your coins”. This maxim, however, entails an enormous responsibility: the protection of private keys that control the funds. Backup management is the most critical element.The current standard method, the 12 or 24-word seed phrase defined by the BIP39 standard, is an ingenious solution. However, for the average user, it introduces a series of risks and complexities that can completely nullify the benefits of self-custody.A new paradigm for hot wallet backups
Recoverbull was born as a response to the pitfalls of traditional software wallet backup. It is an open-source protocol developed by Bull Bitcoin, designed to make backups secure and accessible to everyone, regardless of technical skills. Its philosophy is based on a series of principles:
- accessibility for all: the protocol is built on the assumption that users can be “uneducated, imprudent, unmotivated, inexperienced or incompetent”, without this compromising the security of their funds;
- anonymity: the protocol avoids collecting any personal data, since any information, including the simple fact of owning bitcoin, can be used by an attacker;
- simplicity and speed: the backup creation process is designed to be completed in less than two minutes, eliminating the complexity and friction that lead many users to postpone this operation;
- no possession of keys: the service that facilitates the backup never takes possession of the user’s private keys, neither in plain text nor encrypted, to avoid being classified as a regulated financial service provider;
- open standards and portability: the protocol leverages known technologies and open standards, ensuring that users are not tied to a single provider and that their backups remain portable.
pull down to refresh
related posts
105 sats \ 0 replies \ @Scoresby 1h
So, the key-server could probably brute force all the keys it's holding. But this is kinda okay because
But even if the key server collects and stores personal information about its users,
This is an interesting approach, but I'm not sure it's that much better. If the key server vanishes, users are in a heap of trouble unless they have a separate backup for their keys. So maybe it's nice to have a way to store your keys in the cloud without worrying (too much) that they get compromised, but you'd still want to have normal backups.
reply