With well-timed nudges designed to encourage users to embrace social recovery, this project seeks to onboard users from the standpoint of wallets that have yet to implement this feature.
Personal Project
User Research
User Interface
Visual Design
Social Recovery is frequently championed as the preferable method to secure a hardware wallet, offering a more resilient and community-oriented approach to asset recovery.
Self-custody of Digital Assets
A movement where user takes full control and responsibility of holding and managing their digital assets without relying on third-party intermediaries.
To most crypto natives, the use of mnemonic phrases is a familiar method for securing digital assets.
One look at the current landscape of crypto wallets, you’ll see that nearly all of the most popular wallets do not currently implement Social Recovery.
One look at the current landscape of crypto wallets, you’ll see that nearly all of the most popular wallets do not currently implement Social Recovery.
While efforts to move the industry towards broader adoption of social recovery is underway, the question I pose envisions another approach:
Transitioning From Seedphrases
A movement where user takes full control and responsibility of holding and managing their digital assets without relying on third-party intermediaries.
While efforts to move the industry towards broader adoption of social recovery is underway, the question I pose envisions another approach:
Just 6 wallets—all of which do not have a recovery mechanism in-case of lost or theft—compose of 76% of the market. If just one of the leaders implemented Social Recovery for their users, others could follow suit.
Asking crypto users their willingness to enable Social Recovery. A challenge of the interview was to respect the desire for privacy in the majority of participants. Interview primarily conducted through discord.
Looked at prior discussions from Vitalik Buterin, Ethereum Research and Crypto Users active on Twitter.
Reviewing behavioral economics, specifically nudging research in the context of security and privacy.
Representativeness heuristic may lead users to perceive security incidents as low-probability events, because they are often not directly observable, and therefore do not conform to the perceived distribution of events online.
It has been shown that users often ignore security warnings, even in the context of sensitive websites, such as banking or health. If users themselves or someone they know have not been hurt due to lax security behaviors, then they are unlikely to heed security advice. (Acquisti et al. 2017)
Looking at existing and wallets that have implemented Social Recovery and their implementation.
Based on the Casual Enthusiast, a fictional persona and user scenario was created to illustrate the challenges the user faces without Social Recovery.
Representativeness heuristic may lead users to perceive security incidents as low-probability events, themselves or someone they know have not been. Still the Model only has
Looking at existing and wallets that have implemented Social Recovery and their implementation.
The insights and deliverables from the research phases is used to separate three key tasks to solve, derive their corresponding users needs formulated as HMWs.
How Might We ensure the users knows the benefits of social recovery and the risk of irrevocable loss?
How Might We make sure the users understand the role guardians in the social recovery process?
How Might We provide guidance on choosing guardians that are reliable and trustworthy?
How Might We incentivizes users to complete the onboarding process?
How Might We alert users that the onboarding process can continue?
Looking at existing and wallets that have implemented social recovery and the onboarding process.
Looking at existing and wallets that have implemented social recovery and the onboarding process.
Looking at existing and wallets that have implemented social recovery and the onboarding process.
Looking at existing and wallets that have implemented social recovery and the onboarding process.
Looking at existing and wallets that have implemented social recovery and the onboarding process.
Instead of the usual placement of the security setting, The tab proposes it its placed front-and-center.
The security tab is placed in the main bottom navbar—on an equal hierarchical plane alongside other key features.
This increases its salience—serving as a persistent visual cue—making it more likely that users will notice and remember to engage with security features.
A persistent notification that is displayed in the Security page.
It showcases instances where users with similar on-chain behaviors have permanently lost the exact same NFT or token—a result of not having Social Recovery.
By presenting real-life consequences, it shifts the user's perception of risk, making the potential for loss both tangible and relatable.
To most crypto natives, the use of mnemonic phrases is a familiar method for securing digital assets; however, this security model is vulnerable to irrevocable loss, often eliciting significant anxiety and fear.
Provides users with real-time insight into their security settings based on their decisions.
Provides users with real-time insight into their security settings based on their decisions.
Provides users with real-time insight into their security settings based on their decisions.
Additionally, the score can be framed to exaggerate the risk.
While there are multiple possible configurations for the type of Social Security a user can have.
Provides users with real-time insight into their security settings based on their decisions.
While there are multiple possible configurations for the type of Social Security a user can have, the default is set to the minimum viable requirements to enable recovery without overwhelming users.
Additionally, the score can be framed to exaggerate the risk.
While there are multiple possible configurations for the type of Social Security a user can have.
Provides users with real-time insight into their security settings based on their decisions.
Provides users with real-time insight into their security settings based on their decisions.
Provides users with real-time insight into their security settings based on their decisions.
To most crypto natives, the use of mnemonic phrases is a familiar method for securing digital assets; however, this security model is vulnerable to irrevocable loss, often eliciting significant anxiety and fear.
Provides users with real-time insight into their security settings based on their decisions.
Provides users with real-time insight into their security settings based on their decisions.
Provides users with real-time insight into their security settings based on their decisions.
Provides users with real-time insight into their security settings based on their decisions.
Provides users with real-time insight into their security settings based on their decisions.
Provides users with real-time insight into their security settings based on their decisions.