Digital Inheritance Plans

Keep control over your own data, forever.

Safely Pass Along Your Inheritance With Your SafeKey.

SafeKey has been designed with custom internal storage that allows encrypted shares of sensitive data to be stored offline. SafeKey is also the only device thatā€™s compatible with our digital inheritance platform InheritiĀ®, which is a patented solution to create your own inheritance plans..

Thanks to our self-developed and patented Secret Shares Distribution Protocol (SSDP) you can easily set up digital inheritance plans with a combination of your SafeKey and InheritiĀ®. This unique process is developed so that multiple beneficiaries can safely maintain shared ownership of your inheritance via their own SafeKey(s).

If an inheritance plan ever needs to be activated, the SafeKeys have to be brought together to merge and decrypt the individual shares. If thatā€™s done successfully, the secret data gets revealed to the beneficiaries. Until then, the data stays decentralized and secret, only known to you as the owner of the inheritance plan. Each individual share is useless on its own but when all the shares are together, they reconstruct the original secret.

With this, SafeKey is enabling people to confidently share private data in a way that is secure and empowering by smartly applying Shamir’s Secret Sharing Algorithm.

What Is A Digital Inheritance Plan?

A digital inheritance plan can be seen as a guide to manage the transfer of digital assets / data from someone who passed away to his/her beneficiaries. It allows private informationā€” ā€œsecretsā€ ā€” to be distributed securely amongst an untrusted network..

It acts as some kind of inventory of all your digital possessions and property and it helps your heirs to gain access to said possessions, without the need of a middleman. Thatā€™s a big advantage over a traditional inheritance plan.

Without a secure digital inheritance plan, your family and friends may no longer have access to your digital assets such as bank accounts, digital wallets, passwords, photos, videos, receipts, lyrics, certain online accounts or even your biggest untold secrets.

This problem didnā€™t exist before the age of the internet, but weā€™re solving it now.

The Digital Inheritance Problem: What If You Die?

In an advancing digital world, the distribution of secret data is critical in terms of digital assets and private information. Currently, centralized digital vaults act as digital ā€˜safe havensā€™ for data but these storage methods are under constant threat from hackers aimed at gaining access to your private data.

The rise of the internet and digital assets requires a more secure method of safeguarding information which can harbor high valuations. Available legacy options require trust in a trustless world and are no longer effective in providing the most secure methods of transferring digital data.

Of course, you can still appeal to classic intermediaries and leave data and instructions directly in your will. For example, it is possible to create a document with instructions and keep it in a safe. Access to the safe is then under the control of the notary, who ensures that everyone included in your will is present at the time the safe is opened. And even without a notary you can make certain arrangements. But how safe is all of this? What if someone gets hold of your data or is able to copy the document? What if the person youā€™re giving the responsibility to take care of the document isnā€™t that trustworthy after all?

There should be better and safer ways to give you a peace of mind, right?

Protect Your Legacy With Your Own Immutable Digital Inheritance Plan Thanks To SafeKey And InheritiĀ®.

When you die, you have more to your name than physical assets or properties.

Your online identity dies with you.

If that happens, family and friends deserve better than being left with piles of online accounts and assets without access to them.

Or have you ever thought about what happens if someone does get hold of the required passwords for your online accounts, but thereā€™s no trustworthy supervisor and they keep the data for themselves? One person can easily steal or hide everything without the rest even noticing.

A digital inheritance plan gives you the power to keep control over your assets forever, even after your death.

Think about:

  • Email accounts
  • Social media accounts
  • Private keys and seed phrases to access your crypto and NFTs
  • Data from all your devices: computers, smartphones, ā€¦
  • All data stored on your hard drives or in your cloud
  • Domain names
  • Bank accounts
  • Investments
  • ā€¦

So how does it work?

How Does Digital Inheritance Work With Your SafeKey?

The most secure solution is to create your own digital inheritance plan through InheritiĀ® in combination with multiple SafeKeys. Itā€™s the only 100% decentralized solution to digital inheritance and its unique Secret Shares Distribution Protocol (SSDP) has multiple patents in different jurisdictions around the world.

InheritiĀ® makes it possible to transfer secret and sensitive data after your death, without anyone else being able to access it in advance or without your consent.

Simply said: InheritiĀ® encrypts and splits data into secret shares. Those shares are then stored on multiple SafeKey devices and have to be brought back together in order to reveal the data.

Important to note here is that you never directly leave funds or actual assets in your will or inheritance plan. Instead you leave data or credentials (guidelines, private keys, passwords, user names, pin codes, ā€¦) to access the location where your assets are located.

The Dead Man Switch (DMS).

Benefits Of Managing Your Inheritance With SafeKey And InheritiĀ®.

SafeKey in combination with InheritiĀ® is the safest solution for your digital inheritance.

  • Stop worrying about your legacy
  • Keep control over your own data, forever
  • Select multiple beneficiaries
  • Eliminate intermediaries
  • Avoid data loss
  • SafeKey allows you to plausibly deny the existence of data
  • Use tamper proof and patented technology
  • Highest standards of security and military grade encryption
  • Ongoing independent audits
  • 3-Layer topology
  • Lifetime validity
  • 100% decentralized
  • No critical information is stored in databases

Generational wealth starts with a digital inheritance plan.

Get Started With A SafeKey!

You should select your SafeKey based on the services (i.e. websites and apps) and devices you want to use the SafeKey with. Please see the resources below to help you decide on which SafeKey will be your best fit.

Start Using Your SafeKey

Get strong security in minutes with the SafeKey, a hardware security key that provides phishing-resistant two-factor authentication and encrypted data storage.

Start now
Get Protected Today

Browse our online store and buy the right SafeKey for your needs.

Visit shop
Why Use A SafeKey?

Discover why you should use a SafeKey and how it'll help you eliminate the security vulnerabilities you're facing today.

Learn more
SafeKey Documentation

Learn how SafeKey works and how it's used.

Go to docs

Other SafeKey Use Cases For Individuals

Two-factor authentication (2FA) is critical to secure your accounts and services online. Keep your accounts protected with SafeKey security keysā€”industry proven, phishing-resistant security for your most important accounts and services.

Learn more

Weak or stolen passwords as well as phishing are among the most common (+60%) gateways for successful hacker attacks. SafeKey makes you unhackable.

Learn more

Get online identity protection in minutes without downloading any additional software. You only have to configure your SafeKey once and future login confirmations are done by a simple push on a button.

Learn more

Social media account takeovers are massively rising. Large scale data breaches and phishing attacks put social media accounts at risk. Thanks to SafeKey, you don't have to worry anymore.

Learn more

Authentication that doesnā€™t require a password at login. Identify yourself by simply touching the button on your SafeKey device.

Learn more

Have you ever thought about what happens if you lose your data or someone intercepts one of your personal devices or backups and gets hold of the passwords for your online accounts?

Learn more

A digital inheritance plan manages the transfer of secret data like social media and email accounts from someone who passed away to his/her beneficiaries.

Learn more