Security First

Trust Through
Mathematics

We don't ask you to trust our intentions. We ask you to trust our code. Our zero-knowledge architecture ensures that even we cannot access your data.

Zero-Knowledge

All data is encrypted client-side before it ever leaves your device. Deheritance never sees your unencrypted files, passwords, or keys.

Decentralized Storage

Your legacy is stored securely encrypted in a vault on a permanent, decentralized and peer-to-peer storage network. No single point of failure. No company shutdown can erase your data.

Smart Triggers

Transfer protocols are executed by audited smart contracts. Access is granted only when specific conditions (like provable inactivity) are met.

Defense in Depth

We employ a multi-layered security approach to ensure your legacy withstands any threat model.

  • AES-256-GCM encryption for all file content.
  • RSA-4096 for key exchange and digital identities.
  • Shamir's Secret Sharing fractions key to unlock your vault.

Responsible Disclosure

Security is a community effort. If you discover a vulnerability in our smart contracts or infrastructure, we want to hear about it.

Report a Vulnerability

Common Questions

Can Deheritance see my data?

No. We use a Zero-Knowledge architecture. Your data is encrypted locally on your device with keys we do not possess before it is ever uploaded. We cannot access your files, even if compelled by law.

What happens if Deheritance goes out of business?

Your legacy is secure. All encrypted vaults are stored on the permaweb, a decentralized and permanent storage network. You or your heirs can retrieve the encrypted data directly from the blockchain at any time, independently of our company's existence.

How does the "Dead Man's Switch" monitoring work?

Our web features monitor for "proof of life" signals, such as logging into your dashboard or confirming an email prompt. If the pre-set inactivity period elapses without a signal, the contract automatically executes the key release protocol to your verified beneficiaries.

How are my encryption keys stored?

We use a non-custodial key management system. Your Master Key is derived from your password and stored locally. For inheritance, shares of the decryption key are split using Shamir's Secret Sharing and encrypted with the heirs' public keys.

Is the code open source?

Yes. Our core smart contracts and security protocols are open source and verified on public block explorers. We believe that true security requires transparency and community auditability.