A Simple Path to
Eternal Peace of Mind
Preserving your legacy shouldn't be complicated. We've streamlined the process into 5 secure steps.
Gather & Encrypt
Collect your important documents, messages, and assets. They are encrypted locally on your device before they ever touch the network.
Define Logic
Decide who receives what and when. Set triggers based on time, inactivity, or verified events.
Secure Storage
Your encrypted vault is distributed across the decentralized web (Arweave), ensuring it cannot be lost, censored, or deleted.
The Silent Watch
Our smart contracts monitor for your predefined triggers while keeping your data private and inaccessible to everyone, including us.
Release
When the time is right, decryption keys are automatically released to your beneficiaries, granting them access to your legacy.
Transparent, One-Time Pricing
Pay once, store forever. No subscriptions, no hidden fees.
One-time Vault
Store something important forever within minutes
- 1 immutable vault
- No subscription. No sign up required
- Document file support (PDF, DOCX, XLS, TXT)
- 6 layer security protocol
- Quantum-proof encryption technology
- Decentralized infrastructure
Editable Vault
For ongoing changes and updates
- 1 editable vault
- 5 times changes and updates anytime
- No subscription. No sign up required
- Document file support (PDF, DOCX, XLS, TXT)
- 6 layer security protocol
- Quantum-proof encryption technology
- Decentralized infrastructure
Editable Vault+
Editable with full media support
- 1 editable vault
- 5 times changes and updates anytime
- No subscription. No sign up required
- Document, image, audio, and video file support
- 6 layer security protocol
- Quantum-proof encryption technology
- Decentralized infrastructure
Frequently Asked Questions
General
Deheritance is a decentralized digital inheritance vault. It allows you to securely store important credentials, documents, memories, and wishes, ensuring they are automatically transferred to your designated beneficiaries if something happens to you.
Traditional wills are public legal documents often ill-equipped for digital assets. Listing passwords in a will is insecure. Deheritance provides the technical mechanism to legally and securely transfer access to digital accounts and crypto assets without exposing credentials publicly.
Your legacy does not depend on our corporate survival. We use decentralized storage networks (like IPFS and Arweave) and smart contracts. This means your vault exists on the blockchain, independent of our company's servers.
Security & Privacy
No. We operate on a Zero-Knowledge architecture. Everything you upload is encrypted client-side before it ever leaves your device. We do not have the keys to decrypt your data—only you and your designated heirs do.
We use military-grade AES-256 encryption for data at rest and TLS 1.3 for data in transit. This is the same standard used by governments and financial institutions globally.
Inheritance Process
We use "Dead Man's Switch" triggers. You set a check-in period (e.g., email ping every 6 months). If you fail to respond after multiple attempts, the system enters a grace period and eventually unlocks the vault for your heirs. Alternatively, appointed "Trustees" can confirm events manually.
When the trigger conditions are met, your heirs receive a secure link via email or SMS. They must verify their identity (as defined by you, e.g., ID check or secret code) to retrieve the decryption keys and access the vault contents.
Yes, as long as you are alive and have access, you can update your vault contents, beneficiaries, and trigger settings at any time. The changes are instant and do not require re-creating the vault.