<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[🔓 SelfRecover — open source protocol for password recovery without email I designed and released SelfRecover under AGPL-3.0-or-later in April 2026, two weeks before the French ID agency (ANTS) breach exposed ~12M citizen accounts via an IDOR.]]></title><description><![CDATA[<p><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f513.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--unlock" style="height:23px;width:auto;vertical-align:middle" title="🔓" alt="🔓" /> SelfRecover — open source protocol for password recovery without email                                                                                                                                         <br />                                                                                                                                                                                                                    <br />  I designed and released SelfRecover under AGPL-3.0-or-later in April 2026, two weeks before the French ID agency (ANTS) breach exposed ~12M citizen accounts via an IDOR. The case for email-less recovery        <br />  suddenly got very tangible.                                                                                                                                                                                       <br />                                                                                                                                                                                                                    <br />  <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f6e1.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--shield" style="height:23px;width:auto;vertical-align:middle" title="🛡" alt="🛡" />  How it works (one line):                                  <br />  The browser computes HMAC-SHA256(secret, current_domain). The server only stores Argon2id hashes of derived values. The raw secret never leaves the user's browser, and a captured secret on site A is useless on<br />  site B (anti-phishing by construction).                                                                                                                                                                           <br />   <br />  <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f3af.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--dart" style="height:23px;width:auto;vertical-align:middle" title="🎯" alt="🎯" /> Two adoption modes:                                                                                                                                                                                            <br />                                                               <br />  ▸ Full: zero email at all. Diceware passphrase (EFF wordlist 7,776 words) + HMAC-per-domain.                                                                                                                      <br />                                                               <br />  ▸ Lite: keeps existing SMTP reset link, but adds a user-memorized word HMAC-derived client-side. So an intercepted reset email is no longer enough to compromise an account. Compatible with legacy stacks.       <br />                                                               <br />  <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f52c.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--microscope" style="height:23px;width:auto;vertical-align:middle" title="🔬" alt="🔬" /> Honest threat model — explicitly out of scope: client compromise (keyloggers, info-stealers), browser exploits, physical coercion, theoretical cryptanalysis of SHA-256 / Argon2id. The protocol assumes a     <br />  trusted endpoint. For higher-assurance contexts, Tails / Qubes is the right answer.<br />                                                                                                                                                                                                                    <br />  <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f433.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--whale" style="height:23px;width:auto;vertical-align:middle" title="🐳" alt="🐳" /> Self-host in 30 seconds:                                  <br />  docker run -p 8080:8080 ghcr.io/pierroons/selfrecover:v0.1.1<br />  (Image multi-arch amd64 + arm64, AGPL labels embedded)                                                                                                                                                            <br />                                                                                                                                                                                                                    <br />  <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f4dc.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--scroll" style="height:23px;width:auto;vertical-align:middle" title="📜" alt="📜" /> GPG-signed tag v0.1.1, release dated 2026-05-05.                                                                                                                                                               <br />                                                                                                                                                                                                                    <br />  <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f517.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--link" style="height:23px;width:auto;vertical-align:middle" title="🔗" alt="🔗" /> Live demos (no signup, ephemeral data):                                                                                                                                                                        <br />  - Full mode: <a href="https://bi-self.my-self.fr/selfrecover/" rel="nofollow noopener"><span>https://</span><span>bi-self.my-self.fr/selfrecover/</span><span></span></a>         <br />  - Lite mode: <a href="https://bi-self.my-self.fr/selfrecover/lite.html" rel="nofollow noopener"><span>https://</span><span>bi-self.my-self.fr/selfrecover</span><span>/lite.html</span></a>                                                                                                                                                     <br />  - Side-by-side comparison (8 adversary classes × 3 models): <a href="https://bi-self.my-self.fr/selfrecover/comparison.html" rel="nofollow noopener"><span>https://</span><span>bi-self.my-self.fr/selfrecover</span><span>/comparison.html</span></a>                                                                                                <br />                                                                                                                                                                                                                    <br />  <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f4da.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--books" style="height:23px;width:auto;vertical-align:middle" title="📚" alt="📚" /> Whitepaper EN: <a href="https://github.com/Pierroons/my-self/blob/main/bi-self/selfrecover/docs/whitepaper-en.md" rel="nofollow noopener"><span>https://</span><span>github.com/Pierroons/my-self/b</span><span>lob/main/bi-self/selfrecover/docs/whitepaper-en.md</span></a>                                                                                                        <br />  <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f4da.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--books" style="height:23px;width:auto;vertical-align:middle" title="📚" alt="📚" /> Whitepaper FR: <a href="https://github.com/Pierroons/my-self/blob/main/bi-self/selfrecover/docs/whitepaper-fr.md" rel="nofollow noopener"><span>https://</span><span>github.com/Pierroons/my-self/b</span><span>lob/main/bi-self/selfrecover/docs/whitepaper-fr.md</span></a>                                                                                                        <br />  <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f527.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--wrench" style="height:23px;width:auto;vertical-align:middle" title="🔧" alt="🔧" /> Repo: <a href="https://github.com/Pierroons/my-self/tree/main/bi-self/selfrecover" rel="nofollow noopener"><span>https://</span><span>github.com/Pierroons/my-self/t</span><span>ree/main/bi-self/selfrecover</span></a>                                                                                                                                       <br />                                                                                                                                                                                                                    <br />  The protocol is the first brick of a broader self-hosted ecosystem (MySelf — <a href="https://my-self.fr" rel="nofollow noopener"><span>https://</span><span>my-self.fr</span><span></span></a>) that includes SelfModerate (community governance), SelfJustice / SelfAct (legal access), SelfFarm-Lite           <br />  (agricultural management), and SelfDataGuard (data-at-rest protection — coming soon).                                                                                                                             <br />                                                                                                                                                                                                                    <br />  Feedback especially welcome from people who have integrated similar split-knowledge schemes, and from anyone running auth flows in self-hosted setups. AGPL-3.0-or-later, no NDA, no commercial agenda — just an  <br />  open protocol that I hope is useful.<br />                                                                                                                                                                                                                    <br />  <a href="https://infosec.exchange/tags/opensource" rel="tag">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/infosec" rel="tag">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/AGPL" rel="tag">#<span>AGPL</span></a> <a href="https://infosec.exchange/tags/privacy" rel="tag">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/selfhosted" rel="tag">#<span>selfhosted</span></a> <a href="https://infosec.exchange/tags/cryptography" rel="tag">#<span>cryptography</span></a> <a href="https://infosec.exchange/tags/authentication" rel="tag">#<span>authentication</span></a> <a href="https://infosec.exchange/tags/zerotrust" rel="tag">#<span>zerotrust</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/020e18ee-efef-4fdc-bafd-6c5e3c63a37b/selfrecover-open-source-protocol-for-password-recovery-without-email-i-designed-and-released-selfrecover-under-agpl-3.0-or-later-in-april-2026-two-weeks-before-the-french-id-agency-ants-breach-exposed-12m-citizen-accounts-via-an-idor.</link><generator>RSS for Node</generator><lastBuildDate>Thu, 14 May 2026 23:31:55 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/020e18ee-efef-4fdc-bafd-6c5e3c63a37b.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 06 May 2026 18:18:29 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to 🔓 SelfRecover — open source protocol for password recovery without email I designed and released SelfRecover under AGPL-3.0-or-later in April 2026, two weeks before the French ID agency (ANTS) breach exposed ~12M citizen accounts via an IDOR. on Fri, 08 May 2026 15:38:43 GMT]]></title><description><![CDATA[<p><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f195.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--new" style="height:23px;width:auto;vertical-align:middle" title="🆕" alt="🆕" /> Update — the "coming soon" SelfDataGuard mentioned at the bottom of this thread is now released as v0.1.0-beta.                                                                                                <br />                                                                                                                                                                                                                    <br />  Per-user envelope encryption that survives DB exfiltration. Same memorized secret unlocks both modules, mathematically isolated via HMAC contexts.                                                                <br />                                                                                                                                                                                                                    <br />  <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f517.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--link" style="height:23px;width:auto;vertical-align:middle" title="🔗" alt="🔗" /> Live demo: <a href="https://dataguard.my-self.fr" rel="nofollow noopener"><span>https://</span><span>dataguard.my-self.fr</span><span></span></a>                                                                                                                                                                        <br />  <img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f4e6.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--package" style="height:23px;width:auto;vertical-align:middle" title="📦" alt="📦" /> Release: <a href="https://github.com/Pierroons/my-self/releases/tag/selfdataguard-v0.1.0-beta" rel="nofollow noopener"><span>https://</span><span>github.com/Pierroons/my-self/r</span><span>eleases/tag/selfdataguard-v0.1.0-beta</span></a><br />                                                                                                                                                                                                                    <br />  <a href="https://infosec.exchange/tags/SelfDataGuard" rel="tag">#<span>SelfDataGuard</span></a> <a href="https://infosec.exchange/tags/InfoSec" rel="tag">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/Cryptography" rel="tag">#<span>Cryptography</span></a></p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/ap/users/116528678863225218/statuses/116539701532313110</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/ap/users/116528678863225218/statuses/116539701532313110</guid><dc:creator><![CDATA[pierroons@infosec.exchange]]></dc:creator><pubDate>Fri, 08 May 2026 15:38:43 GMT</pubDate></item></channel></rss>