Decentralized and Encrypted Backups
SafeKey Pro has been designed with custom internal storage that allows shares of data to be stored offline. This means that you can use multiple SafeKey Pro devices to create decentralized backups of your important data, such as private keys, passwords, and other sensitive data.
Alternatively, SafeKey Mobile provides a flexible and secure mobile solution. You can securely store encrypted shares of your backup plans directly on your phone, offering on-the-go access without compromising security. It seamlessly integrates with Inheriti® and provides a user-friendly option for those who prefer mobile storage instead of, or in addition to, SafeKey Pro.
The most secure solution is to create your own decentralized data backup plans through Inheriti® in combination with multiple SafeKey Pro devices or a mix of SafeKey Pro and SafeKey Mobile. This 100% decentralized solution utilizes the unique Secret Shares Distribution Protocol (SSDP), which has multiple patents around the world.
Simply said: Inheriti® encrypts and splits data into secret shares. Those shares are then stored on multiple SafeKey Pro devices or mobile phones with the SafeKey Mobile app, and have to be brought back together in order to reveal the data.
Important to note here is that you never directly store your passwords, private keys or seed phrases on your SafeKeys. Instead you leave encrypted shares which are useless and unreadable on their own. No one will ever have access to your data or will be able to read it, not even SafeKey or Inheriti®.
You’re the only one that knows what data gets encrypted.
As an extra security layer, Inheriti® uses a Plan Trigger for backup plans. This activation method ensures that only you, or authorized individuals, can access the data at a designated time or under specific conditions. The Plan Trigger requires an explicit action from you, such as logging in or providing a unique code, to authorize the opening of the backup plan.
The encrypted shares remain securely stored and inaccessible unless the correct Plan Trigger conditions are met. As long as you fulfill the required action (which signifies your approval to access the plan), the encrypted data remains protected and inaccessible. This added layer of control ensures that no unauthorized party can gain access to your backup plan, even if they obtain the necessary shares.
Example Data For Your Encrypted Backups
Personal identification information
Financial account details and passwords (bank account information, ...)
Social media account information and login (usernames, passwords, ...)
Cryptocurrency wallet or exchange information (private keys, seed phrases, ...)
Important messages and communication history
Digital property and assets
Emergency contact information
Personal notes and journals
Contact information for friends and family
Personal preferences and settings
Personal identification numbers (PIN)
Financial records and transactions
Customer and client information
Sales and marketing data
Employee information and records
Business plans and strategies
Intellectual property and trade secrets
Business contact information
Business registration and legal documents
...
Last updated