Reset lost credentials

Technically, Miraheze 1>Special:MyLanguage/System administrators|system administrators (also known as staff) can reset credentials, such as passwords or 2 Factor Authentication records. However, policy-wise, staff do not reset anyone's credentials on behalf of them. This is because staff fears that they might be trapped in soceng>d:Q376934|social engineering. As such, staff requires undeniable, math-based proof that the requesting user is indeed the authentic owner of the account before we can do the reset.

In general, we don't do a password reset. If you don't have email configured and lost your password, consider that account gone. Everything is case-by-case and done at the discretion of the staff.

We know you
If we are sufficiently sure that requesting person is authentic user behind the claimed account, we may do the reset. This depends on the user, and how we got to know the user.

Committed identity
1>:w:Wikipedia:Wikipedia Signpost/2007-05-14/Committed identity|Committed identity is a secret wdhash>d:Q183427|hash. The contents are only known to the generating user until the hash is revealed to staff when you need to prove ownership.

Linked 1>:w:Wikipedia:Wikipedia Signpost/2007-05-14/Committed identity|SignPost page is documenting enough that you can just follow.


 * Browse to [https://text2hash.toolforge.org/ text2hash].
 * Enter your 'secret'. It should be long enough (not just two-three words, not easy to guess, preferably have some random string (i.e. today's date). Hash is "SHA512" - leave it as is. If it is not SHA512, change to SHA512.
 * The string used in this help page is  .
 * text2hash will dynamically generate the hash. Copy the result.
 * In this example, hash is  .
 * Paste your hash into your userpage.
 * In this example, do  .
 * Now, close the tab and re-open it.
 * Verify the same original string and verify that the newly generated hash matches the hash in template.
 * IF, and ONLY IF the two hash matches, save it.

And when you need to prove your ownership, if staff asks, send an email to tech@undefinedmirahezeorg with the string. If you are putting "" around it, tell us if we need to remove it when putting the hash.

GPG
If you have a gpg>d:Q223204|Gnu Privacy Guard key with signing functions, you can use it to prove your ownership.


 * 1) Create a GnuPG key. This is not explained in this help page. [<tvar|debian>https://keyring.debian.org/creating-key.html</> Debian] has a great how-to page for this. Just make sure your key doesn't expire (When asked for , just enter or give 0.)
 * 2) If you followed above example, you now have a GnuPG key. Now, when your key was created, gpg told you about  . Paste that value somewhere. This is very important.
 * 3) Sign a statement (do Clearsign.) with "current date", statement " " Example in <tvar|example>User:Revi/ssh</>.
 * 4) Save the signature with the original text and the fingerprint on wiki. Wrap your comment with   otherwise MediaWiki formatting will mess up the GPG signature.
 * 5) When requested, send a signed email from the specified key to <tvar|tech>tech@undefinedmirahezeorg</> to verify your identity.
 * 6) Your key must be available from   pool, so we can verify your key independently. Verify that your key is available by checking against [<tvar|ubuntu>https://keyserver.ubuntu.com</> keyserver.ubuntu.com], [<tvar|mit>https://pgp.mit.edu</> pgp.mit.edu], and [<tvar|surfnet>http://pgp.surfnet.nl</> pgp.surfnet.nl]. Your key should be accessible from all of three servers. (If your key is new, it may take time to synchronize the key between key servers. Try again after 24 hours.)

This requires understanding of how GPG key creation, signing, and keyserver works, and thus not recommended for newbies. This is an option for technically savvy users.