MPC Powered Self-Custody Vault for Seed Phrases Passwords NFTs Art work all digital assets
Protect & Pass on you Crypto Wallets Passwords, NFTs Seed Phrases
Your keys, your coins. Secrets vault protects your freedom and wallets and ensures your designated beneficiaries will take possession of your wallets when the time comes.
Secure your spot to qualify for 1-year access:
Most secure vault for self-custody owners
Why it’s the Best Vault in the world?
Hacker & Quantum ResistantWe utilize state-of-the-art cryptographic algorithms such as Shamir’s Secret Sharing Algorithm, Elliptic-curve Diffie-Hellman Algorithm, and AES-256 Encryption to secure and divide your secrets into shards.
Multi-party ComputationWith our multi-party computation (MPC) technology, you can invite trusted individuals to secure your crypto vault using their digital identities. This advanced technology is widely used by top crypto custody providers to offer an additional layer of protection.
Live / Selfie ValidationLive/selfie validation adds an extra layer of identity verification that helps prevent fraud and insider threats.
5 Reasons you need our service
You may be using your hot and cold wallets but they don’t offer you an inheritance plan.
You can use this vault as an ultimate backup so, in the event you lost your paper / hot / cold wallets, you can still retrieve your secrets.
Clarity & Guidance
Designating a Trustee, beneficiaries and their asset distribution offer clarity and peace of mind.
Crypto Trust or Will.
Creating your directives and linking your vaults to the directive offers added clarity and establishes clear guidelines for your heirs
We provide unique digital legacy planning options that are not available elsewhere.
How it works
Setting up the account:Sign up and invite your trusted friends or family (we call them Guardians).
Configure your MPC QuorumAfter a minimum of three Guardians have accepted your request, you can set the minimum quorum and finalize the Guardians.
Enrolling secrets:Once you complete your MPC configuration, you are ready to enroll the secrets.
Set up InheritanceYou can set up inheritance for each of your vaults. A simple 5-step workflow enables you to designate your trusses, beneficiaries and asset distribution for the vault.
They love it, you will too!
Javier Vicente Gonzalez Casper Labs““The CryptoLegacy project is solving one of the most recurrent and important current real problems but focused on the digital assets, crypto /nfts. First they are solving the fact that the users can recover their accounts avoiding losing all their assets. Second, for the present/future they are making sure that these assets automatically are transferred to the recipients already stated in their smart contracts. This is really important because otherwise these assets will be frozen or lost. They are using blockchain technology in order to automatically secure and transfer all these assets at the same time that ensure that the property is not compromised by having all the records available in a public blockchain where anyone can proof what belongs to who.”
James Burns Estate Attorney“The most significant thing we can do for the future is provide the tools for the digital landscape that consolidates it all for those we leave behind. The future is now with Cloud Locker in my mind and once the public catches on how it work, I’m sure it will become a planning staple.”
Travisse Hansen Co-Founder Radiant Wallet“Crypto Legacy fills a gaping hole in Defi ecosystem. If Defi is going to eventually surpass Tradfi then inheritance and estate planning have to be solved - people just won’t move there money here otherwise. CryptoLegacy saw that coming and made it surprisingly easy regardless of which exchange or wallet you use. “
Frequently Asked Questions
MPC (Multi-party Computation) secret sharing is a technique that divides a secret input into shares and distributes them among multiple parties (we call them as Recovery Agents). This method is used to protect the input's privacy and security. Shamir's secret sharing is a common method used for this purpose. Here, the input is divided into n shares (equal to the number of Recovery Agents), and the owner sets a minimum threshold of shares required to reconstruct the original input.Each share is then given to the Recovery Agent, ensuring that no one party has access to the entire input. When the original input needs to be reconstructed, the shares are combined using polynomial interpolation. At least the minimum threshold of shares is required to reconstruct the original input. In MPC secret sharing, the owner of the secret divides the input into encrypted shards and distributes them among the Recovery Agents. The owner can then request the shards from the agents, uses cryptographic algorithm to combine them to reconstruct the original input when needed. In summary, MPC secret sharing allows the owner to divide their input into shards, distribute them among the Recovery Agents, and reconstruct the original input by combining the shards using a cryptographic algorithm. At Crypto Legacy, we apply additional layers of process to protect and safeguard secrets. To learn more about how we use MPC for secret protection, please visit our website.
Secrets Vault is a super secure cloud locker for your digital information. This vault can be used to safeguard your crypto keys, seed phrases, passwords and other important digital information.
Far far away, behind the word mountains, far from the countries Vokalia and Consonantia, there live the blind texts. Separated they live in Bookmarksgrove right at the coast
Your private keys are the keys to your crypto kingdom, and protecting them is crucial for the safety and security of your digital assets. Secrets Vault offers the most robust and secure platform for storing your private keys, ensuring that only you have access to your crypto holdings.