Obi Public Docs
  • FOR USERS
    • Quickstart: Using Obi
  • FOR BUILDERS
    • Obi: Cross-Chain Account and User Management
    • Dev Quickstart: Connecting Your App
    • Dev Quickstart: Building Multi-Chain Apps
    • πŸ”΅The Obi Smart Account Suite
      • πŸ”’Multikey
        • 🎣Preventing Phishing
        • πŸ“²SMS and Other Web2 Providers
        • πŸ’•Final Recovery
      • πŸ”Signet
        • Draft Signet Whitepaper
      • πŸ’•Extra Life
      • πŸ€–Automatons
      • ⏳Sessions
        • Threshold Escalation
      • πŸ§™β€β™‚οΈParty Members
        • Allowances: Hot Wallets, Budgets, and Subscriptions
        • Allow/Block/Delay Lists
      • 🧩Obi Stack Overview
      • β›½Gasless UX
      • πŸ”General Obi Features
      • πŸ“œSmart Account Design Philosophy
      • πŸ—οΈSmart Contract Architecture & Flow
    • πŸ›£οΈRoadmap: Upcoming Features
      • πŸ”§Duress Mode
      • πŸ“³Security Notifications and Lockdowns
      • βœ‹Global Transaction Limit (Sanity Limit)
      • 🌐Obi Service Providers
        • Incentivizing Service Providers
    • πŸ₯‡Obi's Unique Advantages
    • πŸ”’Multikey Attack & Loss Vectors
      • Passkey
      • Cloud Key
      • SMS Key
      • Telegram Key
      • WhatsApp Key
      • Social Recovery Key
      • Email Recovery Key
      • Ledger Hardware Key
      • Map Points Key
      • NFC Key
      • Major 2 Key Loss Vectors and Mitigations
      • Major 2 Key Attack Vectors and Mitigations
      • β€œUnlocked Obi Theft” Attack
  • Glossary
Powered by GitBook
On this page
  1. FOR BUILDERS
  2. Roadmap: Upcoming Features

Security Notifications and Lockdowns

There are numerous cases in which a service may be able to detect that a user is attempting to recover a key. Using SMS keys with an incorrect security answer, requesting new simple recovery emails, and trying to brute force an entropy-boosted NFC or Map Points keys are all examples. If the attacker is using the Obi app, even more key intrusion attempts could be detected.

While the Obi security model relies on numerous types of keys, rather than making a single type 100% secure – which we judge to be impossible – it is very useful to notify a current user that one of their keys is under attack.

Meanwhile, if the recovery attempt is by the user themselves, the notifications will pose no inconvenience.

Here’s an example:

  1. An attacker obtains access to a user’s phone number by socially engineering a SIM swap.

  2. The attacker attempts to guess the security answer against a Twilio service endpoint.

  3. Upon the first incorrect guess, the Twilio service endpoint triggers a push notification to the user associated with the given phone number. β€œSomeone is trying to recover your Obi SMS key. If this isn’t you, tap here to lock down and recover.”

  4. The user can now lock their account temporarily, giving them time to handle the key update without engaging in a race against time. This is particularly important when a SIM swap is more serious than just an Obi attack: the user can handle other consequences and fix their Obi Account at their leisure.

Note that even if the attacker guesses the security answer correctly in step #2, they are still unlikely to have account access in any secure Multikey setup, such as a basic 2-of-4 or a recommended 3-of-7.

PreviousDuress ModeNextGlobal Transaction Limit (Sanity Limit)

Last updated 1 year ago

πŸ›£οΈ
πŸ“³