Serenity Documentation
GitHubGitHub (opens in a new tab)
  • Overview
    • Device
  • Questions and remarks for the security audit
    • Introduction
    • User Chain (Devices)
    • User Registration
    • User & Device Authentication
    • User & Device Logout
    • Workspace Chain (Membership & Roles)
    • Workspace Member Devices Proof
    • Workspace Invitation
    • Workspace Key (Encryption)
    • Folder (Encryption & Integrity)
    • Document Chain (Share Links)
    • Document
    • Document Attachments
    • Document Comments
    • Client Server (Authentication & Authorization)
    • Secure Client Storage
    • Miscellaneous
    • Comments
    • Data Sync
    • Resources
    • Threat Model
    • Workspace Signature Chain

On This Page

  • Password Reset
Question? Give us feedback → (opens in a new tab)Edit this page
Cryptography
Miscellaneous

Miscellaneou

Password Reset

Not yet implemented.

The idea is to allow a user to create one or possibly more recovery keys in the settings. They have to be added to each workspace chain.

With the recovery key and email verification a user can take over an account and replace the MainDevice.

This would require to re-run the OPAQUE registration flow in order to create a new login process.

An example can be found https://github.com/serenity-kit/opaque/tree/main/examples/fullstack-e2e-encrypted-locker-nextjs (opens in a new tab). It also includes Verifpal proofs: https://github.com/serenity-kit/opaque/tree/main/examples/fullstack-e2e-encrypted-locker-nextjs/verifpal (opens in a new tab)

Secure Client StorageComments

Serenity Documentation