The recovery-disabled bargain that makes AAS unusual
The most distinctive design choice in Advanced Account Security is what OpenAI took away. Standard consumer accounts at every major platform lean on email and SMS recovery as a backstop because support teams cannot, in practice, manually verify a stranger's identity at scale. AAS removes that backstop entirely: email and SMS recovery are disabled, replaced by backup passkeys, additional hardware keys, and recovery keys that the user must store themselves. This collapses the attacker's surface area to material the user physically possesses, which is exactly the property that defeats credential-phishing kits and SIM-swap attacks.
The cost is symmetrical. As TechCrunch's Lucas Ropek noted, losing the keys can mean permanently losing the account, and there is no mention in the launch material of a human appeals path. OpenAI's choice to require two passkeys, two hardware keys, or one of each before login partially hedges this — losing one factor is recoverable if the other is intact — but the overall posture is: the user owns the risk in exchange for owning the security. That is a posture journalists and dissidents already accept for other tools, and it is the reason AAS's target list reads the way it does. For everyone else, it is a meaningful behavior change that the product surface alone cannot teach.



