v2024.12.06.2230

Your Digital Legacy
Protected Forever

Securely share your most critical data with trusted parties in emergency situations. Built with quantum-resistant cryptography and zero-knowledge architecture.

Why VaultWard?

Zero-Knowledge

Your data is encrypted before it leaves your device. We never see your secrets.

Quantum-Resistant

Built with Kyber768 and Dilithium for post-quantum security.

Dead Man's Switch

Automatic release to trusted contacts if you become unresponsive.

Shamir Secret Sharing

Split keys across multiple parties. No single point of failure.

What You Can Store

Protect both digital assets and physical vault locations

Encrypted

Digital Vault

End-to-end encrypted in VaultWard servers

  • 🔑 Password manager master password
  • 📧 Email recovery credentials
  • 💰 Bank & investment account info
  • 🪙 Crypto seed phrases & wallets
  • 📄 Scanned documents (PDF, images)
  • 🔐 2FA backup codes
Location Info

Physical Vault

Store location & access details for physical items

  • 🏦 Safe deposit box location & key
  • 🔒 Home safe combination
  • 📍 Storage unit address & code
  • 🗝️ Safety key locations
  • 📦 Where originals are stored
  • 🏠 Hidden item locations

Legal & Identity

Essential documents for your heirs

  • 📜 Will & Living Trust
  • ⚖️ Power of Attorney
  • 🏥 Medical directive
  • 🪪 Passport & ID copies
  • 🏠 Property deeds & titles
  • 📋 Insurance policies
Personal

Final Wishes

Messages and instructions for loved ones

  • 💌 Letters to loved ones
  • 🕯️ Funeral preferences
  • 🐾 Pet care instructions
  • 👨‍👩‍👧 Family contacts list
  • 💼 Business succession
  • 📱 Digital legacy wishes

How VaultWard Protects Your Data

Military-grade cryptography with zero trust architecture

1 Key Generation & Derivation

Hardware
Your Passkey
FIDO2 / WebAuthn credential stored in secure hardware
WebAuthn PRF Extension
Browser
PRF Output
32 bytes unique per credential + salt
HKDF-SHA256
Browser
KEK — Key Encryption Key
256-bit AES key derived from passkey
AES-256-GCM encrypt
Server
DEK — Data Encryption Key
Random 256-bit key, encrypted by KEK, stored in database
AES-256-GCM encrypt
Server
Your Encrypted Documents
Each with unique nonce, stored encrypted in database

2 Shamir Secret Sharing

Browser
DEK — Data Encryption Key
Your 256-bit master key that encrypts all documents
Shamir Split (K-of-N)
Browser
Key Shares Generated
DEK split into N shares using GF(256) polynomial interpolation
X25519 + NaCl Box
Contacts
Encrypted Shares Distributed
Each share encrypted to contact's public key, only they can decrypt
Stored Encrypted
Server
Zero-Knowledge Storage
Server stores encrypted shares but cannot decrypt any of them

3 Emergency Access Recovery

Server
Dead Man's Switch Triggered
User missed check-ins, waiting period elapsed
Email Notification
Contacts
Contacts Request Access
Each contact authenticates and decrypts their share
Quorum Reached (K shares)
Browser
DEK Reconstructed
Lagrange interpolation combines K shares to restore the key
AES-256-GCM Decrypt
Browser
Vault Decrypted
Authorized contacts can now access the vault contents
AES-256-GCM Data Encryption
X25519 + NaCl Key Exchange
GF(256) Shamir Secret Sharing
WebAuthn PRF Key Derivation
Zero Knowledge Server Blind
K-1 Secure Info-Theoretic

No Single Point of Failure

With Shamir's Secret Sharing, even if some contacts are unavailable, your data remains accessible to those who need it.

Information-Theoretic Security

K-1 shares reveal absolutely nothing about your encryption key. This is mathematically provable, not just computationally hard.

Client-Side Encryption

Your data is encrypted before leaving your device. VaultWard servers never see your plaintext data or encryption keys.

Ready to secure your legacy?

Join our beta program and be among the first to protect your digital assets.

Join Beta Program