Backup containers
Accepted web formats: ZIP / JSON / DAT / TXT. The web flow performs format checks and tries to extract recognizable fragments (wallet JSON, encrypted blobs, keystore fragments) where available.
Inputs & formats guide
This is an operational guide to inputs the web flow can classify and validate. Complex recovery runs in the desktop tool — coverage depends on wallet type, export format, and data completeness.
Provide one input method at a time. The router will identify network family and suggest the next step based on structure.
Accepted web formats: ZIP / JSON / DAT / TXT. The web flow performs format checks and tries to extract recognizable fragments (wallet JSON, encrypted blobs, keystore fragments) where available.
Use this when you don’t have a backup file. Addresses and IDs are primarily used for routing: identifying likely network family and prompting the correct capture method.
Note: address-only input cannot reconstruct missing keys. It’s used to route you to the right export or desktop workflow.
In compatible scenarios, the routing layer can recognize certain key artifacts and guide the correct next step. This is not a request to paste secrets — keep inputs minimal and structured.
Only what you need: purpose → script type. Coverage depends on wallet export format and whether derivation metadata is present.
m / purpose' / coin_type' / account' / change / index
m/84'/0'/0'/0/0
m/49'/0'/0'/0/0
m/44'/60'/0'/0/0
If you don’t know your path: the router can infer likely families from export schemas and suggest the correct desktop path.
Multisig recovery requires sufficient cosigner material. PSBT is a transport artifact — useful for analysis and guidance, not a substitute for keys.
Descriptors describe spending conditions. When available, they improve routing precision and migration confidence.
Descriptors capture script type and key origins in a structured, machine-readable form — often the most reliable “handoff” for recovery or migration.
pkh(...)
sh(wpkh(...))
wpkh(...)
tr(...)
wsh(sortedmulti(m, xpub1, xpub2, ...))
Execution still depends on having sufficient key material and correct origins. The router uses descriptor structure as a strong compatibility signal.
Keep inputs minimal, structured, and aligned with the workflow.