Decentralized and Encrypted Backups
SafeKey Pro has been designed with custom internal storage that allows shares of data to be stored offline. This means that you can use multiple SafeKey Pro devices to create decentralized backups of your important data, such as private keys, passwords, and other sensitive data.
The most secure solution is to create your own decentralized data backup plans through Inheriti® in combination with multiple SafeKey Pro devices. It’s the only 100% decentralized solution available and its unique Secret Shares Distribution Protocol (SSDP) has multiple patents in different jurisdictions around the world.
Simply said: Inheriti® encrypts and splits data into secret shares. Those shares are then stored on multiple SafeKey Pro devices and have to be brought back together in order to reveal the data.
Important to note here is that you never directly store your passwords, private keys or seed phrases on your SafeKeys. Instead you leave encrypted shares which are useless and unreadable on their own. No one will ever have access to your data or will be able to read it, not even SafeKey or Inheriti®.
You’re the only one that knows what data gets encrypted.
As an extra security layer, Inheriti® has a Dead Man Switch (DMS) with different activation mechanisms in place, which ensures that you can prevent your plan from being opened if someone ever tries to do this (for example when someone got access to all your SafeKeys/plan shares). The DMS share is an additional share that's stored in a smart contract on the blockchain. Only if you don't respond within a designated timeframe, the DMS share is released and the activation method is triggered. This DMS share is essential for merging all shares. So as long as you respond to the activation mechanisms (which essentially means that you don't want the plan to be opened yet), the DMS share won't be released and the data stays encrypted and secure.
Example Data For Your Encrypted Backups
Personal identification information
Financial account details and passwords (bank account information, ...)
Social media account information and login (usernames, passwords, ...)
Cryptocurrency wallet or exchange information (private keys, seed phrases, ...)
Important messages and communication history
Digital property and assets
Emergency contact information
Personal notes and journals
Contact information for friends and family
Personal preferences and settings
Personal identification numbers (PIN)
Financial records and transactions
Customer and client information
Sales and marketing data
Employee information and records
Business plans and strategies
Intellectual property and trade secrets
Business contact information
Business registration and legal documents
...
Last updated