Show HN: If you lose your memory, how to regain access to your computer?

Account recovery failures & distrust of big providers

  • Several stories of being locked out of long‑held Google accounts despite correct passwords and backup codes; recovery prompts get stuck on unreachable devices or unsupported phone numbers.
  • People warn that Google (and similar services) should be treated as a liability: use Takeout, don’t rely on their recovery, and keep independent backups.
  • Apple’s ecosystem (iCloud, Apple ID lockouts, Legacy Contact not including Keychain) is seen as convenient but scary lock‑in; some export passwords periodically as a hedge.

Approaches to post‑memory / post‑death access

  • OP’s tool: client‑side Shamir Secret Sharing, producing ZIP/PDF bundles that can be pre‑distributed to friends for “social recovery” if memory is lost.
  • Alternatives:
    • Google Inactive Account Manager / dead‑man’s switches (or DIY via GitHub Actions).
    • Password managers with emergency access (Bitwarden, Vaultwarden; some share master passwords with partners).
    • Low‑tech: master password written in a journal or on paper, in a safe, safe‑deposit box, or with a lawyer, sometimes split across multiple people.

Threat models & philosophy

  • Some explicitly want no recovery if they forget: “If you don’t know the password, you don’t need it,” preferring legal delegation (wills, POA) and separate access for others.
  • Others focus on digital inheritance: ensuring family can reach banking, infrastructure, and self‑hosted services, not necessarily every private file.
  • Debate over whether the bigger risk is memory loss vs friends’ betrayal; betrayal risk rises with the financial value of what’s protected.

Shamir Secret Sharing & technical concerns

  • Shamir is repeatedly suggested as the “right” primitive (M‑of‑N access, information‑theoretic security), but commenters note it is easy to implement incorrectly and deserves standardization and real audits.
  • Some suggest simpler schemes (multiple independent encryptions or Reed–Solomon‑style constructions) to avoid Shamir pitfalls.
  • Threshold choices (e.g., 5‑of‑7) are questioned as too high given accidents, death, or people losing shards.

Physical storage & disaster reality

  • Fireproof safes may fail in real house fires; water damage is often worse. Suggestions include: bank boxes (with caveats about theft, sealing after death, and banks phasing them out), floor safes, metal plates for engraving secrets, and redundancy across locations.
  • People emphasize backups of everything that matters (from photos to playlists), not just passwords.

Human factors & future‑you

  • Many note: passwords alone aren’t enough; heirs need a “map” and written instructions.
  • There’s reflection on aging, TBI, long‑COVID, and memory “bitrot,” plus advice to write for “future you,” use notebooks/valet bowls, and run periodic “drills” to ensure any recovery plan actually works.
  • A recurring joke/critique: “who even has five trusted friends?”—the social assumption behind N‑of‑M schemes may not fit everyone.