Back to articles
Building Authentication Without Collecting Any Personal Data

Building Authentication Without Collecting Any Personal Data

via Dev.to WebdevRubem Vasconcelos

What If Your Auth System Collected Zero Personal Data? Traditional authentication has a common pattern: it requires you to collect personal information before you can verify identity. Email. Phone number. Password. All of it ends up in a database, and databases get breached. But there's a different model — one borrowed from cryptocurrency wallets — where the server stores nothing that can be traced back to a real person. Let's build it. The Core Idea Instead of email + password, the user gets a 12-word seed phrase . From that phrase, we derive a cryptographic key pair. The public key becomes their anonymous identity on the server. The private key and the raw mnemonic never leave the browser. Login doesn't ask for the full phrase either. It challenges the user to provide 3 randomly chosen words — which are hashed client-side before comparison. The server only ever sees hashes. Here's what the server ends up storing: { "username" : "a1b2c3d4" , "publicKey" : "8f7a9b2c1d3e4f5a..." , "mnem

Continue reading on Dev.to Webdev

Opens in a new tab

Read Full Article
0 views

Related Articles