Safely Pass Along Your Inheritance With Your SafeKey.
SafeKey has been designed with custom internal storage that allows encrypted shares of sensitive data to be stored offline. SafeKey is also the only device thatās compatible with our digital inheritance platform InheritiĀ®, which is a patented solution to create your own inheritance plans..
Thanks to our self-developed and patented Secret Shares Distribution Protocol (SSDP) you can easily set up digital inheritance plans with a combination of your SafeKey and InheritiĀ®. This unique process is developed so that multiple beneficiaries can safely maintain shared ownership of your inheritance via their own SafeKey(s).
If an inheritance plan ever needs to be activated, the SafeKeys have to be brought together to merge and decrypt the individual shares. If thatās done successfully, the secret data gets revealed to the beneficiaries. Until then, the data stays decentralized and secret, only known to you as the owner of the inheritance plan. Each individual share is useless on its own but when all the shares are together, they reconstruct the original secret.
With this, SafeKey is enabling people to confidently share private data in a way that is secure and empowering by smartly applying Shamir’s Secret Sharing Algorithm.
Get your SafeKey Introduction to SafeKeyWhat Is A Digital Inheritance Plan?
A digital inheritance plan can be seen as a guide to manage the transfer of digital assets / data from someone who passed away to his/her beneficiaries. It allows private informationā āsecretsā ā to be distributed securely amongst an untrusted network..
It acts as some kind of inventory of all your digital possessions and property and it helps your heirs to gain access to said possessions, without the need of a middleman. Thatās a big advantage over a traditional inheritance plan.
Without a secure digital inheritance plan, your family and friends may no longer have access to your digital assets such as bank accounts, digital wallets, passwords, photos, videos, receipts, lyrics, certain online accounts or even your biggest untold secrets.
This problem didnāt exist before the age of the internet, but weāre solving it now.
Get your SafeKey Introduction to SafeKeyThe Digital Inheritance Problem: What If You Die?
In an advancing digital world, the distribution of secret data is critical in terms of digital assets and private information. Currently, centralized digital vaults act as digital āsafe havensā for data but these storage methods are under constant threat from hackers aimed at gaining access to your private data.
The rise of the internet and digital assets requires a more secure method of safeguarding information which can harbor high valuations. Available legacy options require trust in a trustless world and are no longer effective in providing the most secure methods of transferring digital data.
Of course, you can still appeal to classic intermediaries and leave data and instructions directly in your will. For example, it is possible to create a document with instructions and keep it in a safe. Access to the safe is then under the control of the notary, who ensures that everyone included in your will is present at the time the safe is opened. And even without a notary you can make certain arrangements. But how safe is all of this? What if someone gets hold of your data or is able to copy the document? What if the person youāre giving the responsibility to take care of the document isnāt that trustworthy after all?
There should be better and safer ways to give you a peace of mind, right?
Get your SafeKey Introduction to SafeKeyProtect Your Legacy With Your Own Immutable Digital Inheritance Plan Thanks To SafeKey And InheritiĀ®.
When you die, you have more to your name than physical assets or properties.
Your online identity dies with you.
If that happens, family and friends deserve better than being left with piles of online accounts and assets without access to them.
Or have you ever thought about what happens if someone does get hold of the required passwords for your online accounts, but thereās no trustworthy supervisor and they keep the data for themselves? One person can easily steal or hide everything without the rest even noticing.
A digital inheritance plan gives you the power to keep control over your assets forever, even after your death.
Think about:
- Email accounts
- Social media accounts
- Private keys and seed phrases to access your crypto and NFTs
- Data from all your devices: computers, smartphones, ā¦
- All data stored on your hard drives or in your cloud
- Domain names
- Bank accounts
- Investments
- ā¦
So how does it work?
Get your SafeKey Introduction to SafeKeyHow Does Digital Inheritance Work With Your SafeKey?
The most secure solution is to create your own digital inheritance plan through InheritiĀ® in combination with multiple SafeKeys. Itās the only 100% decentralized solution to digital inheritance and its unique Secret Shares Distribution Protocol (SSDP) has multiple patents in different jurisdictions around the world.
InheritiĀ® makes it possible to transfer secret and sensitive data after your death, without anyone else being able to access it in advance or without your consent.
Simply said: InheritiĀ® encrypts and splits data into secret shares. Those shares are then stored on multiple SafeKey devices and have to be brought back together in order to reveal the data.
Important to note here is that you never directly leave funds or actual assets in your will or inheritance plan. Instead you leave data or credentials (guidelines, private keys, passwords, user names, pin codes, ā¦) to access the location where your assets are located.
Get your SafeKey Introduction to SafeKeyThe Dead Man Switch (DMS).
As an extra security layer, InheritiĀ® has a Dead Man Switch (DMS) with different activation mechanisms in place, which ensures that no one steals the data before they’re eligible to.
The encrypted DMS share is stored in a smart contract on the blockchain and only if you don’t respond within the designated timeframe, the DMS share is released.
This DMS share is essential for merging the shareholder’s shares. So as long as you respond to the activation mechanisms (which essentially means you are still alive), the DMS share won’t be released and the data stays safe and encrypted.
Get your SafeKey Introduction to SafeKeyBenefits Of Managing Your Inheritance With SafeKey And InheritiĀ®.
SafeKey in combination with InheritiĀ® is the safest solution for your digital inheritance.
- Stop worrying about your legacy
- Keep control over your own data, forever
- Select multiple beneficiaries
- Eliminate intermediaries
- Avoid data loss
- SafeKey allows you to plausibly deny the existence of data
- Use tamper proof and patented technology
- Highest standards of security and military grade encryption
- Ongoing independent audits
- 3-Layer topology
- Lifetime validity
- 100% decentralized
- No critical information is stored in databases
Generational wealth starts with a digital inheritance plan.
Get your SafeKey Introduction to SafeKeyGet Started With A SafeKey!
You should select your SafeKey based on the services (i.e. websites and apps) and devices you want to use the SafeKey with. Please see the resources below to help you decide on which SafeKey will be your best fit.
Start Using Your SafeKey
Get strong security in minutes with the SafeKey, a hardware security key that provides phishing-resistant two-factor authentication and encrypted data storage.
Start nowWhy Use A SafeKey?
Discover why you should use a SafeKey and how it'll help you eliminate the security vulnerabilities you're facing today.
Learn moreOther SafeKey Use Cases For Individuals
Two-factor authentication (2FA) is critical to secure your accounts and services online. Keep your accounts protected with SafeKey security keysāindustry proven, phishing-resistant security for your most important accounts and services.
Learn moreWeak or stolen passwords as well as phishing are among the most common (+60%) gateways for successful hacker attacks. SafeKey makes you unhackable.
Learn moreGet online identity protection in minutes without downloading any additional software. You only have to configure your SafeKey once and future login confirmations are done by a simple push on a button.
Learn moreSocial media account takeovers are massively rising. Large scale data breaches and phishing attacks put social media accounts at risk. Thanks to SafeKey, you don't have to worry anymore.
Learn moreAuthentication that doesnāt require a password at login. Identify yourself by simply touching the button on your SafeKey device.
Learn moreHave you ever thought about what happens if you lose your data or someone intercepts one of your personal devices or backups and gets hold of the passwords for your online accounts?
Learn moreA digital inheritance plan manages the transfer of secret data like social media and email accounts from someone who passed away to his/her beneficiaries.
Learn more