{"version":1,"pages":[{"id":"L950p40r0gYdOokRaIi9","title":"Introduction To SafeKey","pathname":"/","siteSpaceId":"sitesp_BU9iX","description":"Welcome to the official documentation for SafeKey."},{"id":"C2flLdzEVuykQhlQUF0C","title":"Choosing Your SafeKey(s)","pathname":"/getting-started/choosing-your-safekey-s","siteSpaceId":"sitesp_BU9iX","description":"","breadcrumbs":[{"label":"Getting Started"}]},{"id":"xoef8hUeXLmds5XhGIhf","title":"Which SafeKey do I need?","pathname":"/getting-started/choosing-your-safekey-s/which-safekey-do-i-need","siteSpaceId":"sitesp_BU9iX","description":"Choosing the right SafeKey model depends on what you want to use it for.","breadcrumbs":[{"label":"Getting Started"},{"label":"Choosing Your SafeKey(s)"}]},{"id":"igWKbJrQSSoofgRUtU0j","title":"How many SafeKeys do I need?","pathname":"/getting-started/choosing-your-safekey-s/how-many-safekeys-do-i-need","siteSpaceId":"sitesp_BU9iX","description":"The amount of SafeKeys you need depends on what you want to use it for.","breadcrumbs":[{"label":"Getting Started"},{"label":"Choosing Your SafeKey(s)"}]},{"id":"n7242TDl7Ogm1iT7hIqm","title":"SafeKey Comparison","pathname":"/getting-started/choosing-your-safekey-s/safekey-comparison","siteSpaceId":"sitesp_BU9iX","description":"Discover all features and technical details of the different SafeKeys and select the one which suits your needs best.","breadcrumbs":[{"label":"Getting Started"},{"label":"Choosing Your SafeKey(s)"}]},{"id":"1IizlmIec6NSdHPKur50","title":"Orders & Shipment","pathname":"/getting-started/choosing-your-safekey-s/orders-and-shipment","siteSpaceId":"sitesp_BU9iX","description":"","breadcrumbs":[{"label":"Getting Started"},{"label":"Choosing Your SafeKey(s)"}]},{"id":"DZkM3pTxMRaEwZqyZ7SN","title":"First Time Using Your SafeKey","pathname":"/getting-started/first-time-using-your-safekey","siteSpaceId":"sitesp_BU9iX","description":"","breadcrumbs":[{"label":"Getting Started"}]},{"id":"HhuAYxmGXvrwy8Ocl8PG","title":"Best Practices","pathname":"/getting-started/first-time-using-your-safekey/best-practices","siteSpaceId":"sitesp_BU9iX","description":"","breadcrumbs":[{"label":"Getting Started"},{"label":"First Time Using Your SafeKey"}]},{"id":"gfxZ4au6nENiuQdIR6NE","title":"SafeKey as Security Key","pathname":"/getting-started/first-time-using-your-safekey/safekey-as-security-key","siteSpaceId":"sitesp_BU9iX","description":"","breadcrumbs":[{"label":"Getting Started"},{"label":"First Time Using Your SafeKey"}]},{"id":"p043Yc3sje4eq0ji22uC","title":"SafeKey as Secure Storage Device for Encrypted Data","pathname":"/getting-started/first-time-using-your-safekey/safekey-as-secure-storage-device-for-encrypted-data","siteSpaceId":"sitesp_BU9iX","description":"","breadcrumbs":[{"label":"Getting Started"},{"label":"First Time Using Your SafeKey"}]},{"id":"QsIK1cZ2ROOULofdcvsp","title":"Glossary","pathname":"/getting-started/glossary","siteSpaceId":"sitesp_BU9iX","description":"","breadcrumbs":[{"label":"Getting Started"}]},{"id":"ZsNAcwNiPUKNuS0ytnJv","title":"Two-Factor Authentication","pathname":"/use-cases/two-factor-authentication","siteSpaceId":"sitesp_BU9iX","description":"","breadcrumbs":[{"label":"Use Cases"}]},{"id":"mjj4n11Rv7cWSxZb14Y8","title":"Passwordless Logins","pathname":"/use-cases/passwordless-logins","siteSpaceId":"sitesp_BU9iX","description":"","breadcrumbs":[{"label":"Use Cases"}]},{"id":"GL8FQCiNFzdnZ7HMa6NC","title":"Phishing Protection","pathname":"/use-cases/phishing-protection","siteSpaceId":"sitesp_BU9iX","description":"","breadcrumbs":[{"label":"Use Cases"}]},{"id":"1tSM5T8mSnzLrqO9sva3","title":"Decentralized and Encrypted Backups","pathname":"/use-cases/decentralized-and-encrypted-backups","siteSpaceId":"sitesp_BU9iX","description":"","breadcrumbs":[{"label":"Use Cases"}]},{"id":"cpaARMTeXUm3QHRyJmel","title":"Digital Inheritance","pathname":"/use-cases/digital-inheritance","siteSpaceId":"sitesp_BU9iX","description":"Generational wealth starts with a digital inheritance plan.","breadcrumbs":[{"label":"Use Cases"}]},{"id":"ZKf7xxIhLgqTNKpcawIl","title":"SafeKey Desktop Tool","pathname":"/tools/safekey-desktop-tool","siteSpaceId":"sitesp_BU9iX","description":"SafeKey management made easy.","breadcrumbs":[{"label":"Tools"}]},{"id":"IWyqw87giMgCNhzPW1WG","title":"Inheriti®","pathname":"/tools/inheriti","siteSpaceId":"sitesp_BU9iX","description":"Inheriti.com is a dApp that, together with SafeKey Pro, helps you to safely manage, store and transfer your digital assets or other secret data like private keys, seed phrases, passwords, ...","breadcrumbs":[{"label":"Tools"}]},{"id":"wzuncCVlyLqJHhq8wFff","title":"SafeKey Mobile","pathname":"/tools/safekey-mobile","siteSpaceId":"sitesp_BU9iX","description":"Your secure mobile storage solution for Inheriti® plan shares.","breadcrumbs":[{"label":"Tools"}]},{"id":"TPQf8PiOwCZeQ06XQqTB","title":"Changelog","pathname":"/tools/safekey-mobile/changelog","siteSpaceId":"sitesp_BU9iX","breadcrumbs":[{"label":"Tools"},{"label":"SafeKey Mobile"}]},{"id":"1RETan54Fts25iuYYG2s","title":"SafeKey Settings","pathname":"/user-guides/safekey-settings","siteSpaceId":"sitesp_BU9iX","description":"","breadcrumbs":[{"label":"User Guides"}]},{"id":"YCgz7Cm5PLiTsXtmTfNO","title":"Firmware Update","pathname":"/user-guides/firmware-update","siteSpaceId":"sitesp_BU9iX","description":"","breadcrumbs":[{"label":"User Guides"}]},{"id":"1A9d3YJUhOg9dCGatKYd","title":"SafeKey Authenticity Check","pathname":"/user-guides/safekey-authenticity-check","siteSpaceId":"sitesp_BU9iX","description":"","breadcrumbs":[{"label":"User Guides"}]},{"id":"bu9DS9g7an0anTjp92VX","title":"PIN Code Management","pathname":"/user-guides/pin-code-management","siteSpaceId":"sitesp_BU9iX","description":"","breadcrumbs":[{"label":"User Guides"}]},{"id":"M7FgucghhFh1JVKKKhFg","title":"Registration Test","pathname":"/user-guides/registration-test","siteSpaceId":"sitesp_BU9iX","description":"","breadcrumbs":[{"label":"User Guides"}]},{"id":"oO66SM3Brkto5LlGLwLy","title":"Login Test","pathname":"/user-guides/login-test","siteSpaceId":"sitesp_BU9iX","description":"","breadcrumbs":[{"label":"User Guides"}]},{"id":"774W795Q9hXfeedpZiny","title":"Factory Reset","pathname":"/user-guides/factory-reset","siteSpaceId":"sitesp_BU9iX","description":"","breadcrumbs":[{"label":"User Guides"}]},{"id":"q4iuCX9wXbMPiGViBw36","title":"Backups","pathname":"/user-guides/backups","siteSpaceId":"sitesp_BU9iX","description":"","breadcrumbs":[{"label":"User Guides"}]},{"id":"7T9RyciUjQITQY1hVctf","title":"Create Backups","pathname":"/user-guides/backups/create-backups","siteSpaceId":"sitesp_BU9iX","description":"","breadcrumbs":[{"label":"User Guides"},{"label":"Backups"}]},{"id":"IjwryiVa7jnegMRuE2EF","title":"Restore Backups","pathname":"/user-guides/backups/restore-backups","siteSpaceId":"sitesp_BU9iX","description":"","breadcrumbs":[{"label":"User Guides"},{"label":"Backups"}]},{"id":"Yr2qWabCwbHm3Vfxnnxy","title":"Identical SafeKey Devices","pathname":"/user-guides/backups/identical-safekey-devices","siteSpaceId":"sitesp_BU9iX","description":"Explanation of the workflow to create two or more identical SafeKey devices.","breadcrumbs":[{"label":"User Guides"},{"label":"Backups"}]},{"id":"5phEqOkp62hkHwr4jeZH","title":"Metadata","pathname":"/technicals/metadata","siteSpaceId":"sitesp_BU9iX","description":"","breadcrumbs":[{"label":"Technicals"}]},{"id":"73V0EuLRbNXgQvYgbhoe","title":"Certificates","pathname":"/technicals/certificates","siteSpaceId":"sitesp_BU9iX","description":"","breadcrumbs":[{"label":"Technicals"}]},{"id":"M8jmfMI77e4DP665Fq1n","title":"Hardware","pathname":"/technicals/hardware","siteSpaceId":"sitesp_BU9iX","description":"","breadcrumbs":[{"label":"Technicals"}]},{"id":"ctPn3josmhKdOpSdwmBD","title":"Identification","pathname":"/technicals/identification","siteSpaceId":"sitesp_BU9iX","description":"","breadcrumbs":[{"label":"Technicals"}]},{"id":"ZPopKEBDiGYTBxjGRHGw","title":"Patents","pathname":"/technicals/patents","siteSpaceId":"sitesp_BU9iX","description":"","breadcrumbs":[{"label":"Technicals"}]},{"id":"ZGvlBMfTYOch6NizOCny","title":"Licensing","pathname":"/technicals/licensing","siteSpaceId":"sitesp_BU9iX","description":"","breadcrumbs":[{"label":"Technicals"}]},{"id":"hyGKWhsQPwNBQ45p3Gkf","title":"Introduction","pathname":"/developers/introduction","siteSpaceId":"sitesp_BU9iX","description":"Developers section of the SafeKey documentation.","breadcrumbs":[{"label":"Developers"}]},{"id":"xmHRabjgo06BLXRUMys2","title":"PHP Software Libraries (FIDO2)","pathname":"/developers/php-software-libraries-fido2","siteSpaceId":"sitesp_BU9iX","description":"SafeTech has created multiple libraries to enable web developers to integrate FIDO compatibility into their websites and start providing SafeKey support with ease.","breadcrumbs":[{"label":"Developers"}]},{"id":"InIMJlrdy4Rm9jWwQs4l","title":"Javascript Libraries (CS)","pathname":"/developers/javascript-libraries-cs","siteSpaceId":"sitesp_BU9iX","description":"The JavaScript libraries are designed to work with browser-based applications and facilitate communication with a SafeKey device. They're constructed using TypeScript and bundled with the parcel tool.","breadcrumbs":[{"label":"Developers"}]},{"id":"briPEwsNUGGqdE0vTaqe","title":"Python CLI Tools (CS)","pathname":"/developers/python-cli-tools-cs","siteSpaceId":"sitesp_BU9iX","description":"This page provides information on Python command line interface (CLI) tools to install and test various features of SafeKey such as Custom Storage (CS).","breadcrumbs":[{"label":"Developers"}]},{"id":"YWCs5Sr4WKRP2YGKEhvh","title":"SafeKey Protocol (CS)","pathname":"/developers/safekey-protocol-cs","siteSpaceId":"sitesp_BU9iX","description":"This chapter contains a description of the protocol used for communication with device’s custom features.","breadcrumbs":[{"label":"Developers"}]},{"id":"nlQOu9BWS5FMSjH8gYbK","title":"High-Level Design Docs (CS)","pathname":"/developers/high-level-design-docs-cs","siteSpaceId":"sitesp_BU9iX","description":"High-level description of how the SafeKey is designed and how it works.","breadcrumbs":[{"label":"Developers"}]}]}