Frequently Asked Questions

Everything you need to know about securing your digital legacy

Getting Started

Deheritance is a decentralized digital inheritance vault built on a zero-knowledge architecture. All data is encrypted on the client side before being permanently stored across blockchain networks. Your encryption keys are divided into multiple key fragments, ensuring that only you and your designated beneficiaries can access your vault.

We combine advanced technologies—including blockchain infrastructure, decentralized storage, and a quantum-resistant sharded encryption protocol—to deliver uncompromising security.


Beyond infrastructure, our AI-powered platform provides intelligent vault and beneficiary management, automated dead-man switch check-ins, secure offline and physical backup options, and unlimited lifetime vault creation.


To guarantee eternal accessibility, we provide open-source vault recovery tools—ensuring your beneficiaries can securely access their inheritance anytime, anywhere, even if Deheritance no longer exists.

Getting started takes less than five minutes. Simply enter or upload the files you want to preserve, add your beneficiaries’ contact information, set private security questions only they can answer, and complete payment using your preferred method—then your legacy will be securely stored forever.

Security & Privacy

Deheritance employs AES-256-GCM (12-byte IV) for authenticated encryption and integrates ML-KEM-768 post-quantum key encapsulation to future-proof the system against quantum computing risks—ensuring uncompromised confidentiality, integrity, and long-term security.

Shamir Secret Sharing splits your encryption key into 5 shares with a 3-of-5 threshold. This means any 3 shares can reconstruct the key, preventing single-point failures. It allows distributed storage of shares while maintaining security - losing 1-2 shares doesn't prevent access, but no single share can unlock the vault alone.

No. Due to our zero-knowledge architecture, all encryption happens client-side before storage. We never see your plaintext data and cannot access your vault, even if we wanted to. Only you and your beneficiaries with the correct fraction keys can decrypt your vault.

Deheritance protects your vault using a multi-layer security architecture designed to prevent unauthorized access, loss, and future cryptographic threats.

1️⃣AES-256 encryption protects your vault data locally before it is uploaded to storage, ensuring it remains completely unreadable even if the storage provider is compromised.
2️⃣ Post-Quantum (Kyber) Encryption protects the decryption key against future quantum computer attacks.
3️⃣ Personal Security Question Entropy adds a human authentication layer, ensuring only authorized individuals can derive the final stored data.
4️⃣ Shamir Secret Sharing splits recovery secrets across multiple trusted parties to prevent single point of failure.
5️⃣ On-Chain Time Lock Enforcement guarantees that vaults cannot unlock before the predefined time.
6️⃣ Dead-Man Switch Automation automatically activates the unlock process if the owner becomes inactive, ensuring the inheritance is never permanently inaccessible while also preventing unauthorized unlocking without the owner’s intent.

Together, these six layers combine cryptographic, human, temporal, and automated safeguards to create a resilient, decentralized inheritance protection system.

Digital Assets

Yes. You can store Bitcoin, Ethereum, and other cryptocurrency private keys and seed phrases securely with Deheritance. They are encrypted with AES-256-GCM, ML-KEM-768 post-quantum key encapsulation and protected by Shamir Secret Sharing, ensuring only your beneficiaries can reconstruct and access them.

You can store a wide range of digital assets, including documents (PDFs), images, audio files, videos, passwords, PINs, private keys, seed phrases, and general notes.

All digital assets are encrypted client-side before leaving your device using strong encryption standards. This ensures that files remain unreadable during transmission and storage, and only the reconstructed encryption key can decrypt them.

No. Deheritance follows a zero-knowledge architecture. Encryption keys are generated on the client side and split into fractional keys. The platform never stores the full key and cannot access your vault contents.

Inheritance Process

You define an inactivity period (e.g., 1 to 12 months). If you do not complete a check-in within that timeframe, the system initiates a grace period. After the grace period expires, the vault is automatically released, allowing your beneficiaries to begin the unlocking and access process. You may also configure manual activation triggers through designated trustees or required verification methods for unlocking the vault.

Beneficiaries will receive the Vault ID and their assigned key fragment(s) through a secure access link delivered via email, chat, or SMS. To access the vault, they must use the designated recovery tools to initiate the unlocking process.

As part of the verification procedure, beneficiaries are required to confirm their identity by answering the security questions you previously configured and provide a minimum of three key fragments to reconstruct the master encryption key and decrypt the vault contents—once the vault has been released under the defined trigger conditions.

Yes—this applies to our one-time plans (Editable Vault and Editable Vault+). As long as you retain access to your key fragments, you can update your vault contents, beneficiaries, trigger conditions, and security questions at any time. Any applicable update fees are processed instantly based on your selected plan, while your original vault ID remains unchanged.

Technical Details

We use decentralized storage networks and IPFS for permanent data storage. This ensures your vault exists independently of any single company or server, cannot be taken down or censored, and remains accessible as long as the blockchain networks exist.

Your vault is stored on decentralized blockchain networks, making it completely independent of our company. Even if Deheritance ceased operations, your vault would remain accessible and functional. The smart contract architecture ensures continued operation without requiring our ongoing involvement.

Vault IDs are cryptographically generated unique identifiers. Your encryption keys are derived using ML-KEM-768 key encapsulation, providing post-quantum security. The entire system is designed to prevent any single party, including us, from accessing or altering your vault contents.

Pricing & Plans

One-time vaults are permanent with a single payment and no ongoing fees. Subscription plans offer multiple permanent vaults, additional features like automated reminders, vaults management and priority support with annual billing options.

No. One-time vaults have a single payment with no recurring charges. Subscription plans have clear annual pricing with no hidden fees. You can cancel anytime and your vaults remain permanently accessible.

We accept all major credit cards, debit cards and bank transfers through Stripe. All payment processing is secure and encrypted.

Canceling your subscription only affects access to convenience platform's features such as the vault management, priority support, and the automated dead-man’s switch. Your encrypted data remains permanently secured on the blockchain and will be not deleted.

There is no need to transfer, migrate, or repeatedly download your data. Simply set up your vault once and let the protocol safeguard it automatically—securely and independently—until the time comes.

Because the cryptographic keys are distributed and independently reconstructible, your vault exists beyond your subscription status—and even beyond our platform. When the time comes, your beneficiaries can securely reconstruct the keys and unlock the vault using our open-source recovery tools or any compatible third-party interface.

Your legacy is never dependent on a monthly or annual fee—and never held hostage or restricted by any company, including ours.

Still have questions?

Can't find the answer you're looking for? Our team is here to help.

Browse Help Center Email Support