How secure is Inheriti®?
Inheriti® is designed with state-of-the-art cryptographic techniques and a fully decentralized architecture to ensure the highest level of security for its users. All personal information and Secret Data are protected through advanced encryption and distributed across multiple secure layers.
Your data remains completely private and under your sole control throughout the entire process. Neither Inheriti nor its employees have access to your information, as confirmed by an independent security audit.
By combining innovative security measures with user-controlled access and decentralized infrastructure, Inheriti ensures your protection plans are safeguarded against breaches and unauthorized access. This provides you with the assurance that your digital legacy is secure and accessible only to your designated beneficiaries.
Where is the secret data stored?
The secret data is never stored in its complete form on a single server or blockchain. Instead, it is:
-
Encrypted: The secret data is encrypted locally on your device before being processed.
-
Distributed: After encryption, the data is split into multiple "shares" and stored across decentralized and secure locations using the patented Secure Share Distribution Protocol (SSDP).
Some shares are stored on the blockchain, ensuring immutability and tamper resistance. Other shares are stored on the SafeKey Mobile app or on SafeKey Pro devices, a hardware-based solution designed for maximum security. This approach ensures maximum security and redundancy while eliminating any single point of failure.
How is Secret data fragmented and encrypted?
SafeTech Labs has developed and patented the Secure Share Distribution Protocol (SSDP), a pioneering solution that ensures Secret Data is encrypted and fragmented into shares. These shares are then distributed among various stakeholders, with each share containing only encrypted fragments of the Secret Data. This design guarantees that even if an unauthorized individual gains access to a share, they cannot extract any of the original secret data.
Can Inheriti® admins access or decrypt the data?
No, Inheriti administrators cannot access or decrypt your secret data. Here's why:
-
Zero Knowledge Architecture: Inheriti operates on a zero-knowledge principle, meaning we never have access to the original secret, the decryption keys, or the complete set of shares.
-
Client-Side Encryption: Encryption occurs entirely on your device, and only encrypted data is processed by the platform. This has been confirmed by independent security audits.
Why is SafeID used for the login credentials for my Inheriti® account?
The login credentials for your Inheriti® account are securely stored within the SafeID application. By keeping this sensitive information separate from the Inheriti platform, the risk of fraud, phishing attacks, and identity theft is significantly reduced. This separation follows a Zero Trust principle, ensuring an additional layer of protection.
SafeID employs advanced security measures to safeguard your data. Passwords are hashed using robust algorithms, ensuring they are never stored in a readable format, while encryption and secure connections protect data during transfer.
To enhance security further, SafeID supports two-factor authentication (2FA) with SafeKey, which uses FIDO/FIDO2 standards. This requires pressing a physical button on a secure device to authenticate and authorize access. Alternative FIDO/FIDO2 security keys can also be used, providing you with a highly secure and user-friendly authentication process.
By integrating SafeID with SafeKey, your Inheriti account benefits from an industry-leading security setup, giving you peace of mind while managing your digital legacy.
What is Inheriti’s unique multi layer or three layer security measure?
Inheriti® utilizes SafeTech Labs’ patented Secure Share Distribution Protocol (SSDP), an innovative solution that ensures secret data is securely encrypted and fragmented into shares. This protocol eliminates single points of failure and enhances data resilience.
The multi layer storage includes:
• Inheriti Database Storage (Cloud): A highly secure database with extensive security measures designed to protect against both physical threats and cyber attacks, in accordance with international security standards and best practices.
• Distributed Ledger Technology (DLT): Immutable blockchain storage anchors shares to a decentralized and tamper-proof system, adding transparency and enhanced protection.
• Custodian Storage: Shares can be stored by the customer on physical devices like the SafeKey Pro for offline, cold storage, or on the SafeKey Mobile application for secure, mobile access.
This tri-layered architecture ensures that the secret data remains protected, even if one storage layer is compromised. Each layer complements the others, providing a robust and decentralized solution for safeguarding sensitive information.
SafeTech Labs, the developer of Inheriti, holds patents for this cutting-edge system in Europe, the USA, and China. For more information, visit our Patents & Trademark page.
What is the sequence of security for protection plan creation?
-
The Secret Data is encrypted and fragmented into a predefined number of shares. All shares stored by plan members are protected by a military-grade, NSA-approved encryption standard (AES-256).
Note: The term "encrypted" refers to the overall concept of securing and encoding data processes. (Note: please publish at the bottom of the article)
-
Encrypted shares are distributed to multiple storage layers using Inheriti’s proprietary SSDP technology, preventing any single owner from accessing the data. The mobile shares receive an additional end-to-end encryption security layer.
-
The Inheriti contract is stored on an immutable blockchain, preventing tampering indefinitely.
-
To decrypt, only the Merge Authority must initiate the merging process of the shares.
-
The initiation of the merging process activates the countdown of the plan triggers.
-
Only after all the predefined triggers have been met, the Validator Share allows the merge to begin.
-
The minimum threshold of shareholders, defined during the plan’s creation, must agree to merge their shares before the shares are merged and decrypted.
-
For additional security, recovery shares can be used in the unforeseen circumstance that a beneficiary is unable or unwilling to join the merging.
What is the additional security layer for mobile shares?
Every mobile share is safeguarded by advanced security measures to prevent unauthorized access at all stages.
-
Before distribution, each encrypted mobile share is additionally encrypted with a unique encryption end-to-end encryption security layer.
-
During distribution, Inheriti employs its Verify Mobile Ownership feature. This feature requires either Inheriti or the planshare holder to confirm ownership of the shares, ensuring that only eligible individuals can participate in the merging process.
Learn more about Verify Mobile Ownership Option.
How do I verify the legitimacy of the Inheriti® platform before merging the shares?
The Inheriti architecture incorporates a feature to ensure secure and authorized connections with the Inheriti platform. As a result, SafeKey Pro and SafeKey Mobile are restricted to connecting only with the authenticated Inheriti platform.
What are the security measures in the merging process?
When the merging process is initiated by the assigned Merge Authority, the plan triggers defined by the plan owner are initiated. Depending on the plan type, the plan owner can respond within the designated timeframe to take action:
-
For an Inheritance Plan: by responding to one of the plan triggers, the owner can block the merging process.
-
For a Data Backup Plan: by responding to all plan triggers, the owner can approve the merging process.
Triggers available for selection include email, SMS, and phone calls, ensuring flexible and timely notifications. For further details, refer to the article about Choose Triggers.
An additional security measure is the use of recovery shares, configured by the plan owner during the plan creation process. These recovery shares can be utilized during the merging process in case a shareholder is unable or unwilling to merge their shares, ensuring the plan's continuity and security.