Decentralized and Encrypted Backups

SafeKey Pro has been designed with custom internal storage that allows shares of data to be stored offline. This means that you can use multiple SafeKey Pro devices to create decentralized backups of your important data, such as private keys, passwords, and other sensitive data.

The most secure solution is to create your own decentralized data backup plans through Inheriti® in combination with multiple SafeKey Pro devices. It’s the only 100% decentralized solution available and its unique Secret Shares Distribution Protocol (SSDP) has multiple patents in different jurisdictions around the world.

Simply said: Inheriti® encrypts and splits data into secret shares. Those shares are then stored on multiple SafeKey Pro devices and have to be brought back together in order to reveal the data.

Important to note here is that you never directly store your passwords, private keys or seed phrases on your SafeKeys. Instead you leave encrypted shares which are useless and unreadable on their own. No one will ever have access to your data or will be able to read it, not even SafeKey or Inheriti®.

You’re the only one that knows what data gets encrypted.

As an extra security layer, Inheriti® has a Dead Man Switch (DMS) with different activation mechanisms in place, which ensures that you can prevent your plan from being opened if someone ever tries to do this (for example when someone got access to all your SafeKeys/plan shares). The DMS share is an additional share that's stored in a smart contract on the blockchain. Only if you don't respond within a designated timeframe, the DMS share is released and the activation method is triggered. This DMS share is essential for merging all shares. So as long as you respond to the activation mechanisms (which essentially means that you don't want the plan to be opened yet), the DMS share won't be released and the data stays encrypted and secure.

Example Data For Your Encrypted Backups

  • Personal identification information

  • Financial account details and passwords (bank account information, ...)

  • Social media account information and login (usernames, passwords, ...)

  • Cryptocurrency wallet or exchange information (private keys, seed phrases, ...)

  • Important messages and communication history

  • Digital property and assets

  • Emergency contact information

  • Personal notes and journals

  • Contact information for friends and family

  • Personal preferences and settings

  • Personal identification numbers (PIN)

  • Financial records and transactions

  • Customer and client information

  • Sales and marketing data

  • Employee information and records

  • Business plans and strategies

  • Intellectual property and trade secrets

  • Business contact information

  • Business registration and legal documents

  • ...

Last updated