Eonian Docs
WebsiteBlogResources
  • ♾️Welcome to Eonian
  • Basics
    • πŸš€Get Started
      • πŸ€—How to Deposit Crypto
      • πŸ›‘οΈHow to Enable Insurance
      • 🍰How to Withdraw Crypto
    • πŸ›‘οΈThe Eonian Protocol
    • πŸ’ͺFeatures and Benefits
    • 🌴What Can I Do With Eonian?
    • βš™οΈHow Eonian Works
      • The Insurance Pool
      • Savings Premium
      • Assets Recovery
    • πŸ––Guides
      • Recovering Assets After a Wallet Hack
    • ❓FAQs
  • PROTOCOL
    • πŸ«‚Governance & DAO
      • Dispute Process
      • Founders
    • 🌾Yield Aggregator
    • ⛰️Roadmap
      • Alpha Test
      • Closed Beta Test
      • Public Beta Test
      • Release v1
    • βš–οΈEconomic Model
      • Risks and Revenue Analysis
      • Revenue Distribution
      • Future Outlook
  • Security
    • πŸ›‘οΈSecurity Overview
    • πŸ“‘Audits
      • πŸ“‹Vertical Audits
    • ⏰Intelligent Emergency Shutdown
  • Ambassador Program
    • ⭐Ambassador Program Overview
    • 🎁The Rewards for Ambassadors
    • πŸš€Onboarding Guide and Roadmap
    • πŸ’ŽReward System
    • πŸ€—The Community Roles
      • πŸ’¬Discord Discussions XP and Levels
      • πŸ’ŒDiscord Invites System
    • πŸ‘‘The Ambassador Roles
      • ❀️Community Advocate
      • πŸŽ‰Crypto Evangelist
      • πŸ–ŒοΈThe Creator
  • Resources
    • πŸ“ˆOpen Statistics
    • ❀️Marketing Collaboration Contacts
    • πŸ‘Job Opportunities
    • 🎨Brand Guide / Media Press Kit
  • Discord
  • Twitter
  • Telegram
  • Medium
  • Github
  • Zealy
  • Galxe
Powered by GitBook
On this page

Was this helpful?

Edit on GitHub
  1. Basics
  2. How Eonian Works

Assets Recovery

One integral part of any wallet is the private key. But there exists a hard problem where to save it. If the key is stored only locally on the device, it guarantees increased security and a lower risk of hack. But if the device is lost, access is lost with it. On the other hand, it is possible to save a key on the server or encrypt and store it on another chain. Some wallets even provide this solution directly. But all of them introduce the risk of private keys being stolen on the server or unencrypted on the chain. And give access to some middleman who can accidentally lose or use this key.

We allow the user to store their key locally on the device. But in case the user loses the device, he is still able to recover access to assets in our protocol by creating a new wallet and then contacting us through the receiver's email. This email works as a 2FA channel, which will be used to target us on which wallet we must move user assets to give access back to these assets.

In the future, we will introduce additional channels, like messengers and phones, to make this recovery process even more convenient. But even one email paired with a wallet can provide a higher level of safety and reliability than a hardware wallet.

PreviousSavings PremiumNextGuides

Last updated 1 year ago

Was this helpful?

βš™οΈ