Wallet Creation, Login, and Security Guide
Step-by-step onboarding for users new to AxionLab and users who want stronger wallet security hygiene.
1) How to Create a Wallet
Open the wallet creation flow and generate your passwordless wallet package. The platform returns a secure JSON keystore plus two-factor bootstrap data. Save this material immediately before doing any other action.
2) How to Log In
Login is based on two elements:
- your JSON wallet file (keystore payload)
- a rotating TOTP code from your authenticator app
Without both factors, login does not complete.
3) Why the JSON File Is Critical
The JSON file is your wallet access container. It is not a decorative export: it is required for authentication and recovery workflows. If you lose this file and your backup paths, account access may become impossible.
4) Storage Strategy: Removable Media and Cloud
You are free to store your JSON in removable media, encrypted archive storage, or cloud backup.
Recommended practice is redundancy with separation:
- one offline copy (USB or encrypted external media)
- one protected remote copy (trusted encrypted cloud vault)
Never keep the only copy on one device.
5) QR Seed Text and 30-Second Rotating Code
During setup, the text shown below the QR is the TOTP secret seed. The authenticator app converts that seed into one-time codes that rotate every ~30 seconds. This follows standard time-based one-time password behavior (TOTP class) to keep authentication light and resilient.
6) Security Design: Lightweight but Strong
AxionLab combines keystore possession + rotating second factor, reducing dependence on static passwords and minimizing reusable credential exposure. This model aims to keep the user flow practical while preserving cryptographic gatekeeping for wallet access.
7) Standards Alignment
The project references recognized post-quantum and cryptographic standardization sources, including:
- NIST FIPS 204
- CRYSTALS-Dilithium reference line
These references frame AxionLab design choices toward strong, standard-aware cryptographic posture.