MPC-powered Inheritance Vault for Your
Seed Phrases  Passwords NFTs  Art work  all digital assets

Secure your spot to qualify for 1-year access

Quantum and hacker-resistant vault for self-custody owners

Play Video

Demand Unbeatable Security

Multi-party computation (MPC) technology

Shamir’s Secrets Algorithm

Elliptic-curve Diffie-Hellman (ECDH) algorithm

AES 256 Encryption

Biometric ID Validation

Leave a legacy and protect your family’s future.

$250 million in crypto was lost along

with his crypto passwords forever- Gerald William Cotton

$321 million worth of Bitcoin was lost

because he lost his password- Stefan Thomas

Provide an Effective Inheritance Plan

While hot and cold wallets serve their purpose, you need the guidance of an expert matched with the perfect solution to plan for your inheritance.

Inheritance Planning Made Infinitely Easier

Designate your primary Trustee and backup Trustees who can take ownership of your vault when the time comes.

How it works

  1. Setting up the account
    Set up your account and appoint a minimum of 3 loved ones as Guardians.
  2. Configure your MPC Quorum
    After a minimum of three Guardians have accepted the request, set the minimum quorum and finalise the Guardians.
  3. Enrolling secrets
    Once MPC configuration is completed, enroll the secrets.
  4. Set up Inheritance
    You can set up an inheritance for each of your vaults.  A simple 5-step workflow enables you to designate your trusses, beneficiaries and asset distribution for the vault.

Most advanced vault on the planet. and have partnered to create the most advanced vault, boasting unparalleled security measures that make it virtually unbreakable, ensuring the utmost protection for your valuable assets.
The Lokblok team has worked at the forefront of hardware-based security engineering for more than two decades and offers ‘Security as a Service’ platform to offer the latest in private key generation and management to secure blockchain applications such as digital asset self-custody.

Lokblok’s achievements:

Best-in-class AI Powered ID Validation

CryptoLegacy partnered with Hyperverge, a global provider of KYC/AML services, operating in over 140 countries. As an ISO27001-certified and GDPR/CCPA-compliant organization, HyperVerge utilizes proprietary technology to deliver exceptional results. Hyperverge’s FaceMatch engine is recognized as best-in-class, achieving top rankings on NIST leaderboards. HyperVerge processed over 750 million identities in the last three years, making them the largest ID verification player globally. 

They love it, you will too!

Learn From Fellow Experts

xpand your professional network and thrive in our exclusive Discord group for legal experts in the estate industry, . Exchange insights, gain valuable knowledge, and foster growth through engaging discussions, shared experiences, and collaborative learning.

Commonly Asked Questions

MPC (Multi-party Computation) secret sharing is a technique that divides a secret input into shares and distributes them among multiple parties (we call them as Recovery Agents). This method is used to protect the input’s privacy and security. Shamir’s secret sharing is a common method used for this purpose. Here, the input is divided into n shares (equal to the number of Recovery Agents), and the owner sets a minimum threshold of shares required to reconstruct the original input.Each share is then given to the Recovery Agent, ensuring that no one party has access to the entire input. When the original input needs to be reconstructed, the shares are combined using polynomial interpolation. At least the minimum threshold of shares is required to reconstruct the original input. In MPC secret sharing, the owner of the secret divides the input into encrypted shards and distributes them among the Recovery Agents. The owner can then request the shards from the agents, uses cryptographic algorithm to combine them to reconstruct the original input when needed. In summary, MPC secret sharing allows the owner to divide their input into shards, distribute them among the Recovery Agents, and reconstruct the original input by combining the shards using a cryptographic algorithm. At Crypto Legacy, we apply additional layers of process to protect and safeguard secrets. To learn more about how we use MPC for secret protection, please visit our website.
Secrets Vault is a super secure cloud locker for your digital information. This vault can be used to safeguard your crypto keys, seed phrases, passwords and other important digital information.
Far far away, behind the word mountains, far from the countries Vokalia and Consonantia, there live the blind texts. Separated they live in Bookmarksgrove right at the coast
Your private keys are the keys to your crypto kingdom, and protecting them is crucial for the safety and security of your digital assets. Secrets Vault offers the most robust and secure platform for storing your private keys, ensuring that only you have access to your crypto holdings.