Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. πŸ”“ SelfRecover β€” open source protocol for password recovery without email I designed and released SelfRecover under AGPL-3.0-or-later in April 2026, two weeks before the French ID agency (ANTS) breach exposed ~12M citizen accounts via an IDOR.

πŸ”“ SelfRecover β€” open source protocol for password recovery without email I designed and released SelfRecover under AGPL-3.0-or-later in April 2026, two weeks before the French ID agency (ANTS) breach exposed ~12M citizen accounts via an IDOR.

Scheduled Pinned Locked Moved Uncategorized
opensourceinfosecagplprivacyselfhosted
2 Posts 1 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • pierroons@infosec.exchangeP This user is from outside of this forum
    pierroons@infosec.exchangeP This user is from outside of this forum
    pierroons@infosec.exchange
    wrote last edited by
    #1

    πŸ”“ SelfRecover β€” open source protocol for password recovery without email

    I designed and released SelfRecover under AGPL-3.0-or-later in April 2026, two weeks before the French ID agency (ANTS) breach exposed ~12M citizen accounts via an IDOR. The case for email-less recovery
    suddenly got very tangible.

    πŸ›‘ How it works (one line):
    The browser computes HMAC-SHA256(secret, current_domain). The server only stores Argon2id hashes of derived values. The raw secret never leaves the user's browser, and a captured secret on site A is useless on
    site B (anti-phishing by construction).

    🎯 Two adoption modes:

    β–Έ Full: zero email at all. Diceware passphrase (EFF wordlist 7,776 words) + HMAC-per-domain.

    β–Έ Lite: keeps existing SMTP reset link, but adds a user-memorized word HMAC-derived client-side. So an intercepted reset email is no longer enough to compromise an account. Compatible with legacy stacks.

    πŸ”¬ Honest threat model β€” explicitly out of scope: client compromise (keyloggers, info-stealers), browser exploits, physical coercion, theoretical cryptanalysis of SHA-256 / Argon2id. The protocol assumes a
    trusted endpoint. For higher-assurance contexts, Tails / Qubes is the right answer.

    🐳 Self-host in 30 seconds:
    docker run -p 8080:8080 ghcr.io/pierroons/selfrecover:v0.1.1
    (Image multi-arch amd64 + arm64, AGPL labels embedded)

    πŸ“œ GPG-signed tag v0.1.1, release dated 2026-05-05.

    πŸ”— Live demos (no signup, ephemeral data):
    - Full mode: https://bi-self.my-self.fr/selfrecover/
    - Lite mode: https://bi-self.my-self.fr/selfrecover/lite.html
    - Side-by-side comparison (8 adversary classes Γ— 3 models): https://bi-self.my-self.fr/selfrecover/comparison.html

    πŸ“š Whitepaper EN: https://github.com/Pierroons/my-self/blob/main/bi-self/selfrecover/docs/whitepaper-en.md
    πŸ“š Whitepaper FR: https://github.com/Pierroons/my-self/blob/main/bi-self/selfrecover/docs/whitepaper-fr.md
    πŸ”§ Repo: https://github.com/Pierroons/my-self/tree/main/bi-self/selfrecover

    The protocol is the first brick of a broader self-hosted ecosystem (MySelf β€” https://my-self.fr) that includes SelfModerate (community governance), SelfJustice / SelfAct (legal access), SelfFarm-Lite
    (agricultural management), and SelfDataGuard (data-at-rest protection β€” coming soon).

    Feedback especially welcome from people who have integrated similar split-knowledge schemes, and from anyone running auth flows in self-hosted setups. AGPL-3.0-or-later, no NDA, no commercial agenda β€” just an
    open protocol that I hope is useful.

    #opensource #infosec #AGPL #privacy #selfhosted #cryptography #authentication #zerotrust

    pierroons@infosec.exchangeP 1 Reply Last reply
    0
    • pierroons@infosec.exchangeP pierroons@infosec.exchange

      πŸ”“ SelfRecover β€” open source protocol for password recovery without email

      I designed and released SelfRecover under AGPL-3.0-or-later in April 2026, two weeks before the French ID agency (ANTS) breach exposed ~12M citizen accounts via an IDOR. The case for email-less recovery
      suddenly got very tangible.

      πŸ›‘ How it works (one line):
      The browser computes HMAC-SHA256(secret, current_domain). The server only stores Argon2id hashes of derived values. The raw secret never leaves the user's browser, and a captured secret on site A is useless on
      site B (anti-phishing by construction).

      🎯 Two adoption modes:

      β–Έ Full: zero email at all. Diceware passphrase (EFF wordlist 7,776 words) + HMAC-per-domain.

      β–Έ Lite: keeps existing SMTP reset link, but adds a user-memorized word HMAC-derived client-side. So an intercepted reset email is no longer enough to compromise an account. Compatible with legacy stacks.

      πŸ”¬ Honest threat model β€” explicitly out of scope: client compromise (keyloggers, info-stealers), browser exploits, physical coercion, theoretical cryptanalysis of SHA-256 / Argon2id. The protocol assumes a
      trusted endpoint. For higher-assurance contexts, Tails / Qubes is the right answer.

      🐳 Self-host in 30 seconds:
      docker run -p 8080:8080 ghcr.io/pierroons/selfrecover:v0.1.1
      (Image multi-arch amd64 + arm64, AGPL labels embedded)

      πŸ“œ GPG-signed tag v0.1.1, release dated 2026-05-05.

      πŸ”— Live demos (no signup, ephemeral data):
      - Full mode: https://bi-self.my-self.fr/selfrecover/
      - Lite mode: https://bi-self.my-self.fr/selfrecover/lite.html
      - Side-by-side comparison (8 adversary classes Γ— 3 models): https://bi-self.my-self.fr/selfrecover/comparison.html

      πŸ“š Whitepaper EN: https://github.com/Pierroons/my-self/blob/main/bi-self/selfrecover/docs/whitepaper-en.md
      πŸ“š Whitepaper FR: https://github.com/Pierroons/my-self/blob/main/bi-self/selfrecover/docs/whitepaper-fr.md
      πŸ”§ Repo: https://github.com/Pierroons/my-self/tree/main/bi-self/selfrecover

      The protocol is the first brick of a broader self-hosted ecosystem (MySelf β€” https://my-self.fr) that includes SelfModerate (community governance), SelfJustice / SelfAct (legal access), SelfFarm-Lite
      (agricultural management), and SelfDataGuard (data-at-rest protection β€” coming soon).

      Feedback especially welcome from people who have integrated similar split-knowledge schemes, and from anyone running auth flows in self-hosted setups. AGPL-3.0-or-later, no NDA, no commercial agenda β€” just an
      open protocol that I hope is useful.

      #opensource #infosec #AGPL #privacy #selfhosted #cryptography #authentication #zerotrust

      pierroons@infosec.exchangeP This user is from outside of this forum
      pierroons@infosec.exchangeP This user is from outside of this forum
      pierroons@infosec.exchange
      wrote last edited by
      #2

      πŸ†• Update β€” the "coming soon" SelfDataGuard mentioned at the bottom of this thread is now released as v0.1.0-beta.

      Per-user envelope encryption that survives DB exfiltration. Same memorized secret unlocks both modules, mathematically isolated via HMAC contexts.

      πŸ”— Live demo: https://dataguard.my-self.fr
      πŸ“¦ Release: https://github.com/Pierroons/my-self/releases/tag/selfdataguard-v0.1.0-beta

      #SelfDataGuard #InfoSec #Cryptography

      1 Reply Last reply
      1
      0
      • R relay@relay.infosec.exchange shared this topic
      Reply
      • Reply as topic
      Log in to reply
      • Oldest to Newest
      • Newest to Oldest
      • Most Votes


      • Login

      • Login or register to search.
      • First post
        Last post
      0
      • Categories
      • Recent
      • Tags
      • Popular
      • World
      • Users
      • Groups