Platform

Overview

How It Works

Beneficiary Identity

Policy Corridors

Deterministic Finality

Architecture

Security Model

Governance

Integration

Solutions

Corridors Overview

Institutional Overview

Pricing

All Scenarios

Humanitarian Impact Fund

Assurance

Technical Assurance

Verify Receipt

Receipt Example

Developers

Documentation

APIs & Bridges

Architecture Docs

Glossary

BID API

Company

About

Team

Partners

Roadmap

Investors

Contact

Blog

All Documentation

Schedule Consultation
Home/Case Studies/Wallet Recovery: Reduce Irrecoverable Account Loss

Wallet Recovery: Reduce Irrecoverable Account Loss

JIL improved onboarding and reduced account loss using modern authentication patterns and secure vault controls.

Scenario Profile
Wallet Provider (Scenario)
Region
Global
Industry
Wallet / Consumer Access
Products Used
Wallet + SDV + Passkeys
Benchmark + Modeled Impact

Benchmark-based analysis

📊
Industry Benchmark (LexisNexis)
The total cost of fraud/abuse exceeds direct loss due to operations and remediation (true cost dynamic).
⚙️
Mechanism
Passkeys + recovery-first flows + step-up on high-risk actions + event receipts.
📈
Modeled Impact
Recovery-first onboarding can reduce recovery-related support burden by 15-45% (modeled).
🧮
Savings Formula
Estimated cost avoided = support + recovery workload cost x (15-45%).
Evidence Produced
Auth events + action receipts + exportable evidence.
$16.6B
FBI IC3 2024 Total Losses
$2.77B
BEC Losses (21K complaints)
79%
Orgs Hit (AFP 2024)
$4.60
Per $1 Fraud (LexisNexis)
Why JIL Wins

Modern finance wins because recovery works. JIL makes self-custody survivable.

Problem

Seed phrase failure and recovery friction caused permanent user loss and support overload.

Expected Outcomes
  • Reduced irrecoverable account incidents (target KPI)
  • Decreased key-loss support tickets
  • Improved onboarding completion rate
The Industry Problem

Why this problem persists

Seed phrase-based wallets create a paradox: the security model that protects users from third-party access is the same model that causes permanent account loss when users lose their recovery phrase. Support teams are overwhelmed by irrecoverable accounts. In this scenario, the wallet provider was losing a measurable percentage of new users who abandoned onboarding at the seed phrase step. Of those who completed onboarding, a significant number eventually lost access permanently due to lost or damaged recovery phrases.

How JIL Solves This

The JIL approach

JIL replaced seed phrases with MPC 2-of-3 threshold signing and WebAuthn passkeys. Users authenticate with biometrics. Recovery uses guardian-based social recovery (2-of-5 approvals + 24-hour timelock). No single point of failure. The onboarding flow eliminated the seed phrase step entirely - users set up a passkey with their device biometrics and designate recovery guardians. Key material is split across three parties (user device, cloud backup, and JIL cosigner) so that no single party can access funds alone, but any two can authorize transactions.

Scenario Parameters
CorridorConsumer wallet onboarding and recovery
Monthly VolumePilot cohort
Risk ClassMedium
IntegrationsWebAuthn + biometric auth + guardian network
Evidence OutputsRecovery log + guardian approvals + timelock evidence
Receipts & Proof Produced

Every settlement event produces verifiable evidence

📜
Settlement Receipt
📝
Intent Attestations
📋
Policy Log
📦
Audit Export

Before vs After

Before JIL
  • Seed phrase dependency
  • Permanent account loss
  • High support ticket volume
  • Poor onboarding completion
After JIL
  • Passkey authentication
  • Guardian social recovery
  • Reduced support tickets
  • Higher onboarding completion

What Made the Difference

MPC 2-of-3

no single point of failure for key management

WebAuthn passkeys

biometric authentication without passwords

Guardian recovery

2-of-5 social recovery with mandatory timelock

Secure Data Vault

encrypted document backup for recovery artifacts

Next Steps

Deployment path

Expand passkey support to all device types, add institutional guardian options for enterprise accounts, and integrate with hardware security modules for high-value wallets.

Benchmark-Based Modeled Impact: The "Modeled impact" estimates above are derived from public benchmarks and the control changes enabled by JIL Sovereign. Actual outcomes vary by corridor coverage, policy configuration, counterparties, and operating environment.

Ready to see JIL in your environment?

These scenarios demonstrate deployed JIL capabilities against documented industry problems. Define your corridor, configure your policies, and run a proof of concept.