top | item 19266940

(no title)

glitch003 | 7 years ago

Chris from Deconet here.

It's an improvement for non-crypto-savvy users, because they don't have to go through the whole 12 word seed phrase process. And if they lose that phrase, they are doomed. Instead, we provide email recovery if the user forgets their password, which is how the rest of the web works.

With respect to centralization, our solution isn't very centralized. All operations are signed by the user's private key, which we do not have access to. In our implementation, there will never be funds stored in this private key. It's used for authorization to release funds from an escrow contract to a pre-determined destination (the client who performed the work).

discuss

order

verdverm|7 years ago

What happens if a user uses a known password / email from the data breaches? Can a hacker then take their funds? How does the destination wallet / key get generated? How do I convert to actual money?

i.e. using email+password is returning to a system which is known to have major security issues for the non-saavy