The server is blind to your vault. Your master key is derived in your browser from your password plus a device-bound Account Secret Key, and never reaches our infrastructure in any form. Vault contents are sealed with AES-256-GCM under that key, so a full breach of our database yields only ciphertext we cannot decrypt.
Contact keys are explicit, not magic. Each contact's one-time key is generated in your browser, then routed through a single dispatch endpoint that forwards it to its delivery channel — email for Guardian, or split between an engraved card and an email for Legacy and Eternal Vault. The endpoint relays the material in transit only; nothing about the key is written to our database, our logs, or any backup. For the split-key tier, neither half unlocks anything on its own — recovery requires both the physical card and the contact's inbox. The encrypted bundle the key unlocks remains server-gated: the access link is a dead URL until the dead-man's switch fires. Read the full architecture on thesecurity page.
Post-quantum by default. Your Eternal Vault is dual-signed with Ed25519 and ML-DSA-65 (NIST FIPS 204). Your data is encrypted with AES-256-GCM, which retains 128 bits of security against Grover’s algorithm. We do not wait for the quantum era to protect the documents your grandchildren will open.
Transparency is not optional. Every production build is signed with an offline key and the manifest is published publicly. Visit the transparency log to verify the JavaScript in your browser matches the JavaScript we shipped.
Your family, not your lawyer. Trusted contacts receive their access keys the day you designate them, mailed as engraved metal cards, or delivered by email. No escrow, no third-party intermediary, no hidden handoff at the worst moment. The platform is the gate, the keys are already home.
Active preservation, not passive cold storage. Primary storage is geo-redundant across multiple regions on a current-generation cloud object store, with continuous SHA-3 fixity checks. Roughly every 10 years the underlying drives, formats, and infrastructure are migrated to current technology — the discipline used by the Library of Congress, national archives, and other archival institutions, formalised by ISO 14721 (OAIS) and PREMIS. M-Disc is an extra redundancy layer on top, never the only copy.