How Pistachio Handles Recovery

How Pistachio Handles Recovery

How Pistachio Handles Recovery

How Pistachio Handles Recovery

Two halves of a glowing digital key suspended in a minimalist futuristic environment. Each key half floats separately, illuminated with soft diffused light. Matte black and silver surfaces with subtle reflections. Background elements hint at secure vault architecture or encrypted data structures without looking technical. Ultra clean, high resolution, symbolic of split key shares and secure recovery.

Account recovery is a critical part of any self custodial wallet. Users need confidence that if a device is lost or replaced, access to funds can be safely restored. Pistachio is designed with a recovery system that prioritizes clarity, security, and user control.

Your Signing Key Stays on Your Device

Pistachio uses a model where the full signing key exists only on the user’s device. It is never transmitted, never stored on Pistachio servers, and never accessible to third parties. All transaction signing is performed locally.

This guarantees that only the user can move funds. Pistachio cannot sign transactions or reconstruct keys under any circumstance.

How Backup and Recovery Shares Work

To enable secure recovery without introducing seed phrases, Pistachio creates two encrypted recovery shares when an account is set up.

  • One encrypted share is backed up to the user’s cloud account.

  • The second encrypted share is stored on Pistachio’s secure servers.

Neither share contains a complete or usable key. Each share represents only a portion of the recovery data and cannot be used independently.

Even more importantly, these two shares cannot be combined into a signing key without the user explicitly initiating recovery and passing authentication checks.

User Authentication Is Required for Recovery

Recovery can only occur when the user performs a verified action to restore their wallet. The process requires:

  1. Logging into Pistachio on a new device.

  2. Passing a liveliness check through both a one time password and biometric verification.

  3. Authorizing the recovery operation.

Only after these steps does Pistachio allow the device to retrieve the two shares and begin the recovery process.

Even if the cloud share and server share were somehow accessed in their raw form, they cannot be combined or decrypted without the user’s authentication and explicit consent.

This ensures that recovery is always user driven, not system driven.

Local Key Reconstruction

Once the user has authenticated:

  1. The new device retrieves the encrypted cloud share.

  2. The device retrieves the encrypted server share.

  3. Both shares are decrypted locally using the user’s credentials.

  4. The device reconstructs the full signing key.

The complete key exists only on the user's device after this process. Pistachio never sees it, cannot recreate it, and cannot access it.

Security Benefits

This system creates several important trust and safety advantages.

  • The user retains complete control over the wallet.

  • Pistachio cannot move funds or reconstruct keys.

  • Recovery requires explicit user action, biometric confirmation, and OTP verification.

  • Backup shares are useless on their own, even if unencrypted.

  • No seed phrases are required.

The result is a modern, reliable, and user friendly approach to self custody.

A Recovery Experience Designed for Real People

Pistachio removes the fragility and stress that come with traditional seed phrase wallets. The system is simple to use, resilient against loss, and grounded in strong security principles.

Your key stays on your device.
Your recovery stays in your control.
Your funds stay protected.

Account recovery is a critical part of any self custodial wallet. Users need confidence that if a device is lost or replaced, access to funds can be safely restored. Pistachio is designed with a recovery system that prioritizes clarity, security, and user control.

Your Signing Key Stays on Your Device

Pistachio uses a model where the full signing key exists only on the user’s device. It is never transmitted, never stored on Pistachio servers, and never accessible to third parties. All transaction signing is performed locally.

This guarantees that only the user can move funds. Pistachio cannot sign transactions or reconstruct keys under any circumstance.

How Backup and Recovery Shares Work

To enable secure recovery without introducing seed phrases, Pistachio creates two encrypted recovery shares when an account is set up.

  • One encrypted share is backed up to the user’s cloud account.

  • The second encrypted share is stored on Pistachio’s secure servers.

Neither share contains a complete or usable key. Each share represents only a portion of the recovery data and cannot be used independently.

Even more importantly, these two shares cannot be combined into a signing key without the user explicitly initiating recovery and passing authentication checks.

User Authentication Is Required for Recovery

Recovery can only occur when the user performs a verified action to restore their wallet. The process requires:

  1. Logging into Pistachio on a new device.

  2. Passing a liveliness check through both a one time password and biometric verification.

  3. Authorizing the recovery operation.

Only after these steps does Pistachio allow the device to retrieve the two shares and begin the recovery process.

Even if the cloud share and server share were somehow accessed in their raw form, they cannot be combined or decrypted without the user’s authentication and explicit consent.

This ensures that recovery is always user driven, not system driven.

Local Key Reconstruction

Once the user has authenticated:

  1. The new device retrieves the encrypted cloud share.

  2. The device retrieves the encrypted server share.

  3. Both shares are decrypted locally using the user’s credentials.

  4. The device reconstructs the full signing key.

The complete key exists only on the user's device after this process. Pistachio never sees it, cannot recreate it, and cannot access it.

Security Benefits

This system creates several important trust and safety advantages.

  • The user retains complete control over the wallet.

  • Pistachio cannot move funds or reconstruct keys.

  • Recovery requires explicit user action, biometric confirmation, and OTP verification.

  • Backup shares are useless on their own, even if unencrypted.

  • No seed phrases are required.

The result is a modern, reliable, and user friendly approach to self custody.

A Recovery Experience Designed for Real People

Pistachio removes the fragility and stress that come with traditional seed phrase wallets. The system is simple to use, resilient against loss, and grounded in strong security principles.

Your key stays on your device.
Your recovery stays in your control.
Your funds stay protected.

Download Today

Download Today