Recovery Schemes

Modified on Wed, 12 Aug, 2020 at 10:12 PM


You will find all the Recovery Scheme Sheets in the Recovery sheets section.

  • The recovery scheme is the overall storage strategy of your seed. It includes all the variables with direct incidence on your seed security, such as storage support, number of shares, physical distribution, recovery conditions, seed length and protection range. 

 

  • Everyone has particular needs when it comes to their assets security. HODLR Disks is designed to be flexible and adapt to your own situation.

 

  • Depending on the importance of what you need to protect, you may choose different levels of security. HODLR Disks recovery schemes are SOLO, TWINS, SPLIT and SHAMIR. 


SOLO 1-OF-1

The essential seed security.

 

HODLR needed

Protects against

Use case examples

Compatibility

1

  • Hacks
  • Physical damages
  • Small amounts of funds
  • Everyday spending software wallets

Any BIP39 seed



TWINS 1-OF-2

Serious security for everyday assets.

 

HODLRs needed

Protects against

Use case examples

Compatibility

2

  • Hacks
  • Physical damages
  • Loss
  • Any wallet with important access rights 
  • Shared wallets/assets
  • Hardware wallet password manager

Any BIP39 seed



SPLIT 2-of-3

Bring resilience to your already existing seed.

 

HODLRs needed

Protects against

Use case examples

Compatibility

3

  • Hacks
  • Physical damages
  • Loss
  • Theft
  • Secure a single seed into a multi-shares recovery scheme
  • Store your seed in different locations

24 words BIP39
 seed only

 


SHAMIR 2-of-3

Long term security foundation for the self-sovereign individual.

 

HODLRs needed

Protect against

Use case examples

Compatibility

3

  • Hacks
  • Physical damages
  • Loss
  • Theft
  • Top-notch self-sovereign resilience 
  • 2 participants shared recovery
  • High grade shares encryption and invisible seed

SLIP39 seed - 20 words shares

+

compatible SLIP39 hardware wallet

 


SHAMIR 3-of-5

Extreme personal resilience.

 

HODLRs needed

Protect against

Use case examples

Compatibility

5

  • Hacks
  • Physical damages
  • Loss
  • Theft
  • Extreme self-sovereign resilience
  • Family/group shared recovery

SLIP39 seed - 20 words shares

+

compatible SLIP39 hardware wallet

 


SHAMIR X-of-Y

Enterprise grade seed security.

 

HODLRs needed

Protect against

Use case examples

Compatibility

up to
16

  • Hacks
  • Physical damages
  • Loss
  • Theft
  • Custom defined recovery scheme
  • Enterprise grade recovery scheme
  • Super Shamir access rights management

SLIP39 seed - 20 words shares

+

compatible SLIP39 hardware wallet



You will find all the associated Recovery Scheme Sheets in our Recovery sheets section.


Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons

Feedback sent

We appreciate your effort and will try to fix the article