Home Security & Legal

Security & Legal

By Admin
6 articles

Security of Inheriti

How secure is Inheriti®? Inheriti® is designed with state-of-the-art cryptographic techniques and a fully decentralized architecture to ensure the highest level of security for its users. All personal information and Secret Data are protected through advanced encryption and distributed across multiple secure layers. Your data remains completely private and under your sole control throughout the entire process. Neither Inheriti nor its employees have access to your information, as confirmed by an independent security audit. By combining innovative security measures with user-controlled access and decentralized infrastructure, Inheriti ensures your protection plans are safeguarded against breaches and unauthorized access. This provides you with the assurance that your digital legacy is secure and accessible only to your designated beneficiaries. Where is the secret data stored? The secret data is never stored in its complete form on a single server or blockchain. Instead, it is: 1. Encrypted: The secret data is encrypted locally on your device before being processed. 2. Distributed: After encryption, the data is split into multiple "shares" and stored across decentralized and secure locations using the patented Secure Share Distribution Protocol (SSDP). Some shares are stored on the blockchain, ensuring immutability and tamper resistance. Other shares are stored on the SafeKey Mobile app or on SafeKey Pro devices, a hardware-based solution designed for maximum security. This approach ensures maximum security and redundancy while eliminating any single point of failure. How is Secret data fragmented and encrypted? SafeTech Labs has developed and patented the Secure Share Distribution Protocol (SSDP), a pioneering solution that ensures Secret Data is encrypted and fragmented into shares. These shares are then distributed among various stakeholders, with each share containing only encrypted fragments of the Secret Data. This design guarantees that even if an unauthorized individual gains access to a share, they cannot extract any of the original secret data. Can Inheriti® admins access or decrypt the data? No, Inheriti administrators cannot access or decrypt your secret data. Here's why: 1. Zero Knowledge Architecture: Inheriti operates on a zero-knowledge principle, meaning we never have access to the original secret, the decryption keys, or the complete set of shares. 2. Client-Side Encryption: Encryption occurs entirely on your device, and only encrypted data is processed by the platform. This has been confirmed by independent security audits. Why is SafeID used for the login credentials for my Inheriti® account? The login credentials for your Inheriti® account are securely stored within the SafeID application. By keeping this sensitive information separate from the Inheriti platform, the risk of fraud, phishing attacks, and identity theft is significantly reduced. This separation follows a Zero Trust principle, ensuring an additional layer of protection. SafeID employs advanced security measures to safeguard your data. Passwords are hashed using robust algorithms, ensuring they are never stored in a readable format, while encryption and secure connections protect data during transfer. To enhance security further, SafeID supports two-factor authentication (2FA) with SafeKey, which uses FIDO/FIDO2 standards. This requires pressing a physical button on a secure device to authenticate and authorize access. Alternative FIDO/FIDO2 security keys can also be used, providing you with a highly secure and user-friendly authentication process. By integrating SafeID with SafeKey, your Inheriti account benefits from an industry-leading security setup, giving you peace of mind while managing your digital legacy. What is Inheriti’s unique multi layer or three layer security measure? Inheriti® utilizes SafeTech Labs’ patented Secure Share Distribution Protocol (SSDP), an innovative solution that ensures secret data is securely encrypted and fragmented into shares. This protocol eliminates single points of failure and enhances data resilience. The multi layer storage includes: • Inheriti Database Storage (Cloud): A highly secure database with extensive security measures designed to protect against both physical threats and cyber attacks, in accordance with international security standards and best practices. • Distributed Ledger Technology (DLT): Immutable blockchain storage anchors shares to a decentralized and tamper-proof system, adding transparency and enhanced protection. • Custodian Storage: Shares can be stored by the customer on physical devices like the SafeKey Pro for offline, cold storage, or on the SafeKey Mobile application for secure, mobile access. This tri-layered architecture ensures that the secret data remains protected, even if one storage layer is compromised. Each layer complements the others, providing a robust and decentralized solution for safeguarding sensitive information. SafeTech Labs, the developer of Inheriti, holds patents for this cutting-edge system in Europe, the USA, and China. For more information, visit our Patents & Trademark page. What is the sequence of security for protection plan creation? 1. The Secret Data is encrypted and fragmented into a predefined number of shares. All shares stored by plan members are protected by a military-grade, NSA-approved encryption standard (AES-256). Note: The term "encrypted" refers to the overall concept of securing and encoding data processes. (Note: please publish at the bottom of the article) 2. Encrypted shares are distributed to multiple storage layers using Inheriti’s proprietary SSDP technology, preventing any single owner from accessing the data. The mobile shares receive an additional end-to-end encryption security layer. 3. The Inheriti contract is stored on an immutable blockchain, preventing tampering indefinitely. 4. To decrypt, only the Merge Authority must initiate the merging process of the shares. 5. The initiation of the merging process activates the countdown of the plan triggers. 6. Only after all the predefined triggers have been met, the Validator Share allows the merge to begin. 7. The minimum threshold of shareholders, defined during the plan’s creation, must agree to merge their shares before the shares are merged and decrypted. 8. For additional security, recovery shares can be used in the unforeseen circumstance that a beneficiary is unable or unwilling to join the merging. What is the additional security layer for mobile shares? Every mobile share is safeguarded by advanced security measures to prevent unauthorized access at all stages. - Before distribution, each encrypted mobile share is additionally encrypted with a unique encryption end-to-end encryption security layer. - During distribution, Inheriti employs its Verify Mobile Ownership feature. This feature requires either Inheriti or the planshare holder to confirm ownership of the shares, ensuring that only eligible individuals can participate in the merging process. Learn more about Verify Mobile Ownership Option. How do I verify the legitimacy of the Inheriti® platform before merging the shares? The Inheriti architecture incorporates a feature to ensure secure and authorized connections with the Inheriti platform. As a result, SafeKey Pro and SafeKey Mobile are restricted to connecting only with the authenticated Inheriti platform. What are the security measures in the merging process? When the merging process is initiated by the assigned Merge Authority, the plan triggers defined by the plan owner are initiated. Depending on the plan type, the plan owner can respond within the designated timeframe to take action: - For an Inheritance Plan: by responding to one of the plan triggers, the owner can block the merging process. - For a Data Backup Plan: by responding to all plan triggers, the owner can approve the merging process. Triggers available for selection include email, SMS, and phone calls, ensuring flexible and timely notifications. For further details, refer to the article about Choose Triggers. An additional security measure is the use of recovery shares, configured by the plan owner during the plan creation process. These recovery shares can be utilized during the merging process in case a shareholder is unable or unwilling to merge their shares, ensuring the plan's continuity and security.

Last updated on Jan 15, 2025

Privacy of Inheriti

How does Inheriti deal with Privacy? The core of the Inheriti service is to protect the privacy of our users and their data. Our Privacy Policy clearly outlines how we manage your information. We adhere to our Privacy Policy, ensuring utmost confidentiality, security, and integrity of all data. Is Inheriti compliant with GDPR and other data protection regulations? Yes. Inheriti is complaint with GDPR. You can find more information about how data is collected and secured and how to access and delete personal data in Inheriti’s Privacy Policy. What are my user rights? A description of your user rights can be found in the Inheriti Privacy Policy. You have the right to: - Request for access to personal data. - Rectification of personal data. - Erasure of personal data. - Restriction of the processing. - Objection to processing. - Data portability. - Withdraw of consent. - Procedure to exercise your rights. What personal data does Inheriti collect? The core of our service is to protect the privacy of our users and their data. Inheriti’s Privacy Policy explains what personal data we collect, what’s the purpose of doing so and how do way handle your personal data. What personal data is shared with third parties? Inheriti's Privacy Protocol provides an overview of all third parties involved and the personal data that is shared with them. What cookies are being used? Inheriti's Privacy Protocol provides an overview of all cookies used on the Inheriti platform and linked platforms and applications.

Last updated on Aug 23, 2024

Legal aspects of an Inheritance plan

Is an Inheritance plan considered a legally binding will? No. A protection plan arranges the transfer of digital information and assets to the people that you fill in as beneficiaries, this is not the same as a legally binding will. Please check with your local legal advice what to do to make it a legally binding will that complies with the legal requirements of the country. Does Inheriti require consultation with a legal advisor? Using Inheriti doesn’t require legal consultation. But, if you want to use your protection plan as a legally binding will, we do advice you to seek local legal advice to ensure that the plan complies with local legislation and is executed as a legally binding will whenever relevant. How can I ensure my protection plan is recognized under local laws? Each location has its own distinct set of laws that dictate how inheritance should be handled within that specific region. Best is to seek local legal advice to ensure that the plan complies with local legislation and is properly executed whenever relevant. How can I make my digital assets part of my official will? You can include your protection plan in your official will. The advantage of using Inheriti is that your secret data is well secured and not in possession or safeguarded by third parties, giving you complete control and privacy. Including your protection plan in your official will can help avoid conflicts and confusion among family members after passing, and ensures that your digital assets are transferred in accordance with your wishes. It also provides a legal document that can be used to enforce your instructions and protect your digital legacy. What are risks of not having a legally binding will alongside my protection plan? Without a legally binding will, there is a risk that the decentralized inheritance plan may not hold up in a court of law. Also, state laws have their own rules and regulations regarding inheritance and may not recognize or adhere to a decentralized inheritance plan. What are relevant legal considerations when creating an Inheritance plan? An Inheritance plan arranges the transfer of secret data that gives access to digital information and assets to people you appoint. Legal consideration that could affect how the inheritance plan is created and executed, are: - Legislation on inheritance: it is important to consult the legislation of your country to understand how inheritance is regulated. In some countries, only blood relations are officially allowed, while others allow for wills and donations. - Marriage contracts: If you are married, check the marriage contract to understand which part of the assets can be inherited and which part remains with the surviving spouse. - Legal heirs: It is important to determine who your legal heirs are according to the legislation of the country in which you live. This can affect who officially inherits the assets. - Taxes: Beneficiaries are often subject to inheritance taxes on the assets they inherit. It is important to understand the local tax legislation and take them into account. It may be wise to seek local legal advice to ensure that the plan complies with legislation and is properly executed whenever relevant.

Last updated on Aug 23, 2024