Decentralized and Encrypted Backups

SafeKey Pro has been designed with custom internal storage that allows shares of data to be stored offline. This means that you can use multiple SafeKey Pro devices to create decentralized backups of your important data, such as private keys, passwords, and other sensitive data.

Alternatively, SafeKey Mobile provides a flexible and secure mobile solution. You can securely store encrypted shares of your backup plans directly on your phone, offering on-the-go access without compromising security. It seamlessly integrates with Inheriti® and provides a user-friendly option for those who prefer mobile storage instead of, or in addition to, SafeKey Pro.

The most secure solution is to create your own decentralized data backup plans through Inheriti® in combination with multiple SafeKey Pro devices or a mix of SafeKey Pro and SafeKey Mobile. This 100% decentralized solution utilizes the unique Secret Shares Distribution Protocol (SSDP), which has multiple patents around the world.

Simply said: Inheriti® encrypts and splits data into secret shares. Those shares are then stored on multiple SafeKey Pro devices or mobile phones with the SafeKey Mobile app, and have to be brought back together in order to reveal the data.

Important to note here is that you never directly store your passwords, private keys or seed phrases on your SafeKeys. Instead you leave encrypted shares which are useless and unreadable on their own. No one will ever have access to your data or will be able to read it, not even SafeKey or Inheriti®.

You’re the only one that knows what data gets encrypted.

As an extra security layer, Inheriti® uses a Plan Trigger for backup plans. This activation method ensures that only you, or authorized individuals, can access the data at a designated time or under specific conditions. The Plan Trigger requires an explicit action from you, such as logging in or providing a unique code, to authorize the opening of the backup plan.

The encrypted shares remain securely stored and inaccessible unless the correct Plan Trigger conditions are met. As long as you fulfill the required action (which signifies your approval to access the plan), the encrypted data remains protected and inaccessible. This added layer of control ensures that no unauthorized party can gain access to your backup plan, even if they obtain the necessary shares.

Example Data For Your Encrypted Backups

  • Personal identification information

  • Financial account details and passwords (bank account information, ...)

  • Social media account information and login (usernames, passwords, ...)

  • Cryptocurrency wallet or exchange information (private keys, seed phrases, ...)

  • Important messages and communication history

  • Digital property and assets

  • Emergency contact information

  • Personal notes and journals

  • Contact information for friends and family

  • Personal preferences and settings

  • Personal identification numbers (PIN)

  • Financial records and transactions

  • Customer and client information

  • Sales and marketing data

  • Employee information and records

  • Business plans and strategies

  • Intellectual property and trade secrets

  • Business contact information

  • Business registration and legal documents

  • ...

Last updated