crypto-logo

MPC Powered Self-Custody Vault for Seed Phrases  Passwords NFTs  Art work  all digital assets

Protect & Pass on you Crypto Wallets  Passwords, NFTs  Seed Phrases

Your keys, your coins.  Secrets vault protects your freedom and wallets and ensures your designated beneficiaries will take possession of your wallets when the time comes.

Secure your spot to qualify for 1-year access:

Most secure vault for self-custody owners

Play Video

Why it’s the Best Vault in the world?

  1. Hacker & Quantum Resistant
    We utilize state-of-the-art cryptographic algorithms such as Shamir’s Secret Sharing Algorithm, Elliptic-curve Diffie-Hellman Algorithm, and AES-256 Encryption  to secure and divide your secrets into shards.
  2. Multi-party Computation
    With our multi-party computation (MPC) technology, you can invite trusted individuals to secure your crypto vault using their digital identities. This advanced technology is widely used by top crypto custody providers to offer an additional layer of protection.
  3. Live / Selfie Validation
    Live/selfie validation adds an extra layer of identity verification that helps prevent fraud and insider threats.

5 Reasons you need our service

Inheritance

You may be using your hot and cold wallets but they don’t offer you an inheritance plan.

Inheritance

You may be using your hot and cold wallets but they don’t offer you an inheritance plan.

Disaster Recovery

You can use this vault as an ultimate backup so, in the event you lost your paper / hot / cold wallets, you can still retrieve your secrets.

Disaster Recovery

You can use this vault as an ultimate backup so, in the event you lost your paper / hot / cold wallets, you can still retrieve your secrets.

Clarity & Guidance

Designating a Trustee, beneficiaries and their asset distribution offer clarity and peace of mind.

Clarity & Guidance

Designating a Trustee, beneficiaries and their asset distribution offer clarity and peace of mind.

Crypto Trust or Will.

Creating your directives and linking your vaults to the directive offers added clarity and establishes clear guidelines for your heirs

Crypto Trust or Will.

Creating your directives and linking your vaults to the directive offers added clarity and establishes clear guidelines for your heirs

five

One-stop-shop

We provide unique digital legacy planning options that are not available elsewhere.

One-stop-shop

We provide unique digital legacy planning options that are not available elsewhere.

How it works

  1. Setting up the account:
    Sign up and invite your trusted friends or family (we call them Guardians).
  2. Configure your MPC Quorum
    After a minimum of three Guardians have accepted your request, you can set the minimum quorum and finalize the Guardians.
  3. Enrolling secrets:
    Once you complete your MPC configuration, you are ready to enroll the secrets.
  4. Set up Inheritance
    You can set up inheritance for each of your vaults.  A simple 5-step workflow enables you to designate your trusses, beneficiaries and asset distribution for the vault.

They love it, you will too!

Frequently Asked Questions

MPC (Multi-party Computation) secret sharing is a technique that divides a secret input into shares and distributes them among multiple parties (we call them as Recovery Agents). This method is used to protect the input's privacy and security. Shamir's secret sharing is a common method used for this purpose. Here, the input is divided into n shares (equal to the number of Recovery Agents), and the owner sets a minimum threshold of shares required to reconstruct the original input.Each share is then given to the Recovery Agent, ensuring that no one party has access to the entire input. When the original input needs to be reconstructed, the shares are combined using polynomial interpolation. At least the minimum threshold of shares is required to reconstruct the original input. In MPC secret sharing, the owner of the secret divides the input into encrypted shards and distributes them among the Recovery Agents. The owner can then request the shards from the agents, uses cryptographic algorithm to combine them to reconstruct the original input when needed. In summary, MPC secret sharing allows the owner to divide their input into shards, distribute them among the Recovery Agents, and reconstruct the original input by combining the shards using a cryptographic algorithm. At Crypto Legacy, we apply additional layers of process to protect and safeguard secrets. To learn more about how we use MPC for secret protection, please visit our website.
Secrets Vault is a super secure cloud locker for your digital information. This vault can be used to safeguard your crypto keys, seed phrases, passwords and other important digital information.
Far far away, behind the word mountains, far from the countries Vokalia and Consonantia, there live the blind texts. Separated they live in Bookmarksgrove right at the coast
Your private keys are the keys to your crypto kingdom, and protecting them is crucial for the safety and security of your digital assets. Secrets Vault offers the most robust and secure platform for storing your private keys, ensuring that only you have access to your crypto holdings.