Récupération sociale

Récupérer son portefeuille via des tiers.

Contenu en attente de traduction. Affichage de la version anglaise.

Instead of a single seed phrase, the user assigns 'Guardians' (friends, legal services, or other devices). If access is lost, a majority of guardians can authorize a new key.

        graph LR
  Center["Récupération sociale"]:::main
  Rel_social_recovery_wallet["social-recovery-wallet"]:::related -.-> Center
  click Rel_social_recovery_wallet "/terms/social-recovery-wallet"
  classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
  classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
  classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
  classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
  linkStyle default stroke:#4b5563,stroke-width:2px;

      

🧒 Explique-moi comme si j'avais 5 ans

An insider threat is like the risk that a babysitter might accidentally leave the stove on or intentionally steal something from your house. You invited them in and gave them the keys, so you have to be careful and make sure they are doing their job correctly and safely.

🤓 Expert Deep Dive

Technically, insider threat programs leverage 'Behavioral Baselines'. The goal is to detect a 'Critical Pathway'—a series of observable behaviors that indicate an individual is moving toward a malicious act. Key technical strategies include 'Digital Rights Management' (DRM) to control what can be done with files even after they are downloaded, and 'Tying Physical Security to Logical Security' (e.g., flagging someone who is logged into the network but hasn't badged into the office). The biggest challenge is 'False Positives'—accusing an innocent, overworked employee of being a spy.

📚 Sources