We don't ask you to trust our intentions. We ask you to trust our code. Our zero-knowledge architecture ensures that even we cannot access your data.
All data is encrypted client-side before it ever leaves your device. Deheritance never sees your unencrypted files, passwords, or keys.
Your legacy is stored securely encrypted in a vault on a permanent, decentralized and peer-to-peer storage network. No single point of failure. No company shutdown can erase your data.
Transfer protocols are executed by audited smart contracts. Access is granted only when specific conditions (like provable inactivity) are met.
We employ a multi-layered security approach to ensure your legacy withstands any threat model.
Security is a community effort. If you discover a vulnerability in our smart contracts or infrastructure, we want to hear about it.
Report a VulnerabilityNo. We use a Zero-Knowledge architecture. Your data is encrypted locally on your device with keys we do not possess before it is ever uploaded. We cannot access your files, even if compelled by law.
Your legacy is secure. All encrypted vaults are stored on the permaweb, a decentralized and permanent storage network. You or your heirs can retrieve the encrypted data directly from the blockchain at any time, independently of our company's existence.
Our web features monitor for "proof of life" signals, such as logging into your dashboard or confirming an email prompt. If the pre-set inactivity period elapses without a signal, the contract automatically executes the key release protocol to your verified beneficiaries.
We use a non-custodial key management system. Your Master Key is derived from your password and stored locally. For inheritance, shares of the decryption key are split using Shamir's Secret Sharing and encrypted with the heirs' public keys.
Yes. Our core smart contracts and security protocols are open source and verified on public block explorers. We believe that true security requires transparency and community auditability.