Akord App
Search…
👋
Welcome to our app docs
Getting Started
Your Akord wallet
FAQs
Product guides
Creating a vault
Invites and permissions
Uploading files
Managing your assets
Using Akord Notes
File versioning with stacks
Storage
Monitoring usage
Transaction list
Top up
Settings
Backup phrase
Password
Arweave
Arweave protocol
Storage endowment
The permaweb
Security
End-to-end encryption
Encryption user flows
Blockchain and authentication
Roadmap
2021
2022
Frequently Asked Questions
How can you store something forever?
What if Akord no longer exists?
Can I delete files from permanent storage?
Do I really pay once and store forever?
Where do I pay to use Akord?
How is pricing determined?
Do I need to use the Arweave coin ($AR)?
Does the price ever change?
Powered By
GitBook
Encryption user flows
Below are a few examples demonstrating our end-to-end encryption in some typical user flows on Akord.
User signup
A backup phrase is generated.
Asymmetric password key is derived from the user’s password.
The backup phrase is encrypted with the password key and securely stored within Akord.
User login
The encrypted backup phrase is retrieved from Akord.
User decrypts the backup phrase locally using their password key.
User derives their signing & encryption keys from the backup phrase.
User's personal data encryption
Alice wants to upload an avatar photo to their profile.
Alice generates a unique access key.
Alice encrypts the avatar with the newly generated access key.
Alice encrypts the access key with their encryption public key.
the encrypted avatar & encrypted access key are stored within Akord.
Alice can now decrypt the avatar using their encryption private key.
Data encryption within the vault
Alice wants to share file within the vault, which Bob also belongs to.
Alice generates a unique access key.
Alice encrypts file with the newly generated access key.
Alice encrypts the access key with the vault public key.
The encrypted file & encrypted access key are stored within Akord.
Bob decrypts the vault private key with their encryption private key.
Bob decrypts the access key with the vault private key.
Bob decrypts the file with the access key.
Security - Previous
End-to-end encryption
Next - Security
Blockchain and authentication
Last modified
10mo ago
Copy link
Contents
User signup
User login
User's personal data encryption
Data encryption within the vault