MPC Powered Emergency Vault with Inheritance for
Important Files
Business Documents
Financial Documents
Password Files
Wills
ID documents & more.
Emergency Vault is the perfect solution that serves as a safeguard against unforeseen disasters and enables instant inheritance in case of emergencies.
Play Video
What we offer
Protect your sensitive information and sensitive files
A hacker and Quantum resistant Cloud Locker that protects confidential files, passwords and more.
Ensure someone you trust have access to the vault in case of emergencies
Designate your beneficiaries and ensure a seamless transfer of your vaults to your loved ones. Families can enjoy peace of mind knowing they can instantly access digital assets through our digital inheritance solution.
Comprehensive Digital Legacy Planning
Capture and preserve life stories, memories, and legacy with Time Capsule feature. Additionally, set up the Emergency Card, enabling first responders or good samaritans to quickly and easily reach emergency contacts in times of need.
Why is this better than any other service
Harnesses the power of Cryptography
Our advanced security measures employ a range of proven cryptographic algorithms, including AES-256 Encryption, Shamir’s Secrets Algorithm, Elliptic-curve Diffie-Hellman algorithm (ECDH)
Multi Party Compute (MPC)
MPC ensures hacker and quantum resistance by distributing computations across multiple parties, safeguarding data even in the face of adversarial attacks or quantum computing threats.
AI Powered Biometric ID Validation
AI-powered biometric ID adds an extra layer of security by leveraging AI to analyze and authenticate users’ biometric characteristics captured in real-time videos, enhancing the accuracy and robustness of the identification process.
For the Tech Savvy Consumers
- Protect all important files (password files, wills, ID documents, business documents etc) from malware, ransomware, hacks, hardware issues, accidental deletion.
- The Vault serves as a safeguard against unforeseen disasters.
- Designate family members as beneficiaries so, they can access your files after death.
For the Busy Business Bees
- Protect all important business documents (formation paperwork, meeting of the minutes, password files, wills, ID documents etc) from malware, ransomware, hacks, hardware issues, accidental deletion.
- The Vault serves as a safeguard against unforeseen disasters.
- Designate business members as beneficiaries so, they can access your files after death.
For the Wealth Managers, Estate Attorneys, Financial Planners & Trustees
Protect your sensitive information and sensitive files
- Safeguard your client documents (Financial documents, business documents, password files, Wills, ID documents etc) from malware, ransomware, hacks, hardware issues, accidental deletion.
- The Vault serves as a safeguard against unforeseen disasters.
- Designate heirs members as beneficiaries so, they can access the files after death.
They love it, you will too!
Javier Vicente Gonzalez
Casper Labs
“ The CryptoLegacy project is solving one of the most recurrent and important current real problems but focused on the digital assets, crypto /nfts. First they are solving the fact that the users can recover their accounts avoiding losing all their assets. Second, for the present/future they are making sure that these assets automatically are transferred to
the recipients already stated in their smart contracts. This is really important because otherwise these assets will be frozen or lost. ”
James Burns
Estate Attorney
“The most significant thing we can do for the future is provide the tools for the digital landscape that consolidates it all for those we leave behind. The future is now with Cloud Locker in my mind and once the public catches on how it work, I’m sure it will become a planning staple.” Travisse Hansen
Co-Founder Radiant Wallet
“Crypto Legacy fills a gaping hole in Defi ecosystem. If Defi is going to
eventually surpass Tradfi then inheritance and estate planning have to
be solved - people just won’t move there money here otherwise.
CryptoLegacy saw that coming and made it surprisingly easy regardless
of which exchange or wallet you use." Learn From Fellow Experts
Expand your professional network and thrive in our exclusive Discord group. Exchange insights, gain valuable knowledge, and foster growth through discussions, shared experiences, and collaborative learning.
Commonly Asked Questions
It is a secure vault that protects important files and documents against threats and natural disasters as well as enables instant inheritance in case of an emergency.
- Our advanced security measures employ a range of proven cryptographic algorithms, including AES-256 Encryption, Shamir’s Secrets Algorithm, Elliptic-curve Diffie-Hellman algorithm (ECDH)
- MPC ensures hacker and quantum resistance by distributing computations across multiple parties, safeguarding data even in the face of adversarial attacks or quantum computing threats.
- AI-powered biometric ID adds an extra layer of security by leveraging AI to analyze and authenticate users’ biometric characteristics captured in real-time videos, enhancing the accuracy and robustness of the identification process.
- Patent-pending Inheritance Platform
In case of emergencies such as life threatening injuries, natural disasters, and cyber threats, your important documents and files will be secure and easily accessible whenever and wherever needed. It also has a special feature that allows your loved ones to inherit them hassle-free and ensure your assets are protected against all threats.
MPC (Multi-party Computation) secret sharing is a technique that divides a secret input into shares and distributes them among multiple parties (we call them as Recovery Agents). This method is used to protect the input’s privacy and security. Shamir’s secret sharing is a common method used for this purpose. Here, the input is divided into n shares (equal to the number of Recovery Agents), and the owner sets a minimum threshold of shares required to reconstruct the original input.Each share is then given to the Recovery Agent, ensuring that no one party has access to the entire input. When the original input needs to be reconstructed, the shares are combined using polynomial interpolation. At least the minimum threshold of shares is required to reconstruct the original input. In MPC secret sharing, the owner of the secret divides the input into encrypted shards and distributes them among the Recovery Agents. The owner can then request the shards from the agents, uses cryptographic algorithm to combine them to reconstruct the original input when needed. In summary, MPC secret sharing allows the owner to divide their input into shards, distribute them among the Recovery Agents, and reconstruct the original input by combining the shards using a cryptographic algorithm. At Crypto Legacy, we apply additional layers of process to protect and safeguard secrets. To learn more about how we use MPC for secret protection, please visit our website.