Security you can verify

Your information is encrypted in your device before anything is sent over the internet. So nobody else can read it, not even us.
And you can verify at any time that this is really happening.

Zero-Access by Design

Only you (and later your beneficiaries) can read your information.

OVERVIEW

SafeHerit is built so that only you (and, when the time comes, the beneficiaries you choose) can read your information. We encrypt everything on your device before it leaves your browser.

We don’t hold your private key and can’t decrypt the information stored in your vault.

Your private key stays with you, and SafeHerit cannot reset or recover it. We recommend you store it securely, and keep a copy in a secure location.

If you later decide to change your key, your browser re-encrypts your data with the new one.

Important: If you permanently lose access to your private key (and any back up you set up), your encrypted data will be irrecoverable and you will have to start a new vault from scratch with a new key.

TECHNICAL DETAILS

How Encryption Works

Your browser locks the data first, then sends it.

OVERVIEW

  1. When you create your account, your browser creates a public key (to encrypt) and a private key (to decrypt).
  2. When you add information to your vault, your browser encrypts it in a way that can only be decrypted using your private key.
  3. Only this encrypted data is sent and stored in our servers. We never see your unencrypted data nor your private key.

That being said, we believe that security claims should be verifiable:

If you are a technical user, you can verify at any time that your data is encrypted in your browser before anything is sent over the internet. 

TECHNICAL DETAILS

Beneficiary Security (Per-Beneficiary Keys)

Each beneficiary has their own “locked box.”

OVERVIEW

Think of each beneficiary having their own locked box. You decide what goes into each box.

Only the beneficiary with the matching key can open their box. Other beneficiaries (and SafeHerit) cannot decrypt items not intended for them.

TECHNICAL DETAILS

Pulse Check & Escalation

Confirm status first; access remains encrypted.

OVERVIEW

SafeHerit periodically checks in on the schedule you set. If you do not respond, we contact your validators (if you registered any) to confirm your status.

This process never reveals your encrypted content. It only authorizes the next step which is to notify your beneficiaries.

TECHNICAL DETAILS

Threat Model & Shared Responsibility

What we defend against, and where you play a part.

OVERVIEW

We protect against server breaches, insider access, and demands for data because we store only encrypted content and do not hold your private key.

Your role is to secure your devices and private keys, use strong unique passwords, and share keys safely with your beneficiaries.

TECHNICAL DETAILS

What we defend against

Your responsibilities

What We Store (and What We Don't)

We store encrypted information about assets, not the assets themselves.

OVERVIEW

SafeHerit store encrypted information about your assets (notes, references, locations, and any files you attach), not the assets themselves. Information about your assets is encrypted before upload, and we do not get to see it at any point.

While SafeHerit helps you provide instructions for your beneficiaries, it is not a legal will and does not provide legal advice. 

We keep encrypted backups to protect against outages.

Backups are useless to anyone without the corresponding private keys.

TECHNICAL DETAILS

Ready to Safeguard Your Future?

Get started with SafeHerit in minutes and experience a painless way to secure your assets, assign beneficiaries, and ensure your legacy is always in the right hands.