Hero Image
Is my data secure?
How does encryption work?
When is data released?
Who gets my data?

See How It’s Done

Let understand how to put your digital legacy on autopilot with encryption, so when the time comes, your data is delivered to your loved ones.

Getting started is simple

As easy as saving a password - just add your important details, add who will receive the data, and rest knowing your data is protected.

1.

Signup & add data

Create your account & Add information like notes, wallets, photos, and more

2.

Add beneficiary

Add Email of people who will receive your data if something happens to you

3.

All set & done

Visit regularly and when you can't, we will deliver your data to your loved ones

Background Image

Open Source & Transparent

Cipherwill has open sourced all it's client code, this ensures that the community can verify how Cipherwill is encrypting the data before uploading to cloud and that no one has access to your data not even Cipherwill.
image of onbaording and profile creation
Onboarding

Your First Steps with Cipherwill

  • First, sign up using your email address.
  • Next, verify your email if not already verified.
  • Since we mostly communicate through email, make sure it's correct and you keep an eye on it.
  • Head over to your profile section and fill in your details, like your name and birthday, so you can view your timeline.
  • Finally, take a look around the settings and dashboard to see everything available.
Data

How Your Data is Organized?

  • In Cipherwill, your data is organized into different types called segments - think of them like notes, files, passwords, and similar stuff.
  • Every piece of data, or "datapod" as we call it, comes with some extra details like a title, version, and tags. This extra info isn't encrypted, which helps you easily search for and sort your data.
  • The main content of each datapod, known as the data payload, is encrypted by you. That means only you can decrypt and access it.
  • Plus, you can add photos, videos, files, and more to the object storage for a richer experience.
segments snapshot
image of factors choices
Security

Your Keys, Your Control: Security Factors in Cipherwill

  • Think of security factors as different ways to encrypt your data and keep it safe.
  • In Cipherwill, you can choose from a variety of these methods, like using a password, FIDO2 keys, YubiKeys, on-device biometrics, crypto wallets, and more.
  • They work by scrambling (encrypting) your data and then unscrambling (decrypting) it only when the right method is used, so only you and the people you authorize can access it.
  • Essentially, these security measures create a pair of keys - a public one and a private one - from random data. The private key is your secret passcode to decrypt your data, while the public key helps to encrypt it securely.
Encryption

How Cipherwill Uses Cascade Encryption?

  • We use AES-256 encryption along with Elliptic Curve Cryptography for data payloads and keys.
  • Every datapod is encrypted with a unique key, and the key itself is encrypted with a public key of security factors you have enabled.
  • Cipherwill encrypts the keys for multiple factors which includes your factors as well as your beneficiaries factors.
  • Each data payload is encrypted multiple times which we call cascade encryption.
  • Cascade encryption means your data gets wrapped in several layers of security. Even if one layer is broken, the rest keep your data safe.
  • In CipherWill, your data is first encrypted with a "time capsule key" and then gets another layer of protection using the beneficiary's public key. This setup means you need both keys to decrypt your data.
  • When it's time to unlock your data, you have to follow a specific order. You first use the beneficiary's private key to remove the first layer, then use the time capsule key to fully access the data.
will execuion schedule image
will execuion schedule image
Schedule

How Cipherwill Knows When to Act?

  • A "trigger" is an event that kicks off the process of checking in to see if you're still around.
  • Once the trigger goes off, your will execution schedule starts, which includes sending you three reminders at set times.
  • Cipherwill will send you these reminders, asking you to log in and confirm that you're still alive.
  • You'll receive these reminders through email, SMS, push notifications, and even phone calls if you've enabled them.
  • If you don't respond to any of these reminders, then CipherWill will proceed to execute the will as scheduled.
Activity

Communication is Key: Avoid Missed Check-Ins

  • Communication is key with a dead man's switch, so it's super important to keep your email address updated.
  • Don't rely on just one method - add multiple ways to be reached, like SMS, push notifications, and phone calls, to make sure you never miss a reminder.
  • Cipherwill checks your activity on the platform to see if you're still around.
  • This activity includes logging in, updating your profile, adding data, and similar actions.
  • So, stay active on the platform to avoid accidentally triggering the will execution.
notification image
onion layer with emphasis on time enc layer
Timelock

Keeping Your Digital Will Secure Until It's Needed

  • Time Capsule Encryption (TCE) mixes time controls with encryption so your data stays locked until the right moment.
  • This is key for digital wills because it lets you decide exactly when beneficiaries can access sensitive info, keeping your privacy safe and avoiding complications.
  • At Cipherwill, we update the time capsule keys every 90-180 days to keep everything secure while ensuring your data is available when needed.
  • With TCE, your data gets two layers of protection—first, it's locked with a time capsule key, then with the beneficiary's public key—making sure only the right person can unlock it at the right time.
Beneficiry

Managing Beneficiary Access and Data Lifespan

  • Beneficiaries are the people you choose to receive your data after you're gone.
  • You can add several beneficiaries and set different access levels for each. You can change your beneficiary list anytime.
  • They only get access once your will is executed, keeping your data private until then.
  • When your will is executed, beneficiaries receive an email and access a special dashboard to view and download your data.
  • They can only see what you've allowed, and their access lasts for about 100 days before your data is permanently deleted.
beneficiary dashboard image
Facts background image

Important facts

  • Public/Private Cryptography
    Cipherwill uses public/private key cryptography to ensure secure communication and data transfer between you and your beneficiaries.
  • AES Encryption
    Data pods are encrypted using 256 AES encryption, providing robust security against unauthorized access.
  • Secure Key Exchange
    A secure key exchange algorithm is used to create unique relationship key pairs for encryption, ensuring that keys are safely generated and distributed.
  • Elliptic Curve Cryptography
    Relationship keys are encrypted using Elliptic Curve Cryptography (ECC), offering strong security with smaller key sizes.
  • Cascade Encryption
    Cascade encryption is a multi-layered encryption method where data is encrypted sequentially using multiple keys or algorithms. Each layer adds an additional level of security, making it harder to decrypt without all required keys.
  • Security Factor Protection
    If you and your beneficiaries have security factors enabled, it is impossible for anyone, including Cipherwill, to access or decrypt your data.

Looking for answers?

Stuck on something? We've got you covered. Check out our frequently asked questions page.

How does Cipherwill verify my death before providing data to beneficiaries?

Cipherwill releases access to your data based on the will execution timeline and verification of your death or inactivity.

What happens if my beneficiaries aren't tech-savvy? Is there support for them to access the data?

Cipherwill ensures that your beneficiaries, regardless of their tech skills, can easily access your data with minimal effort.

Can my data be accessed or subpoenaed by governments or law enforcement agencies?

Cipherwill ensures that your data is fully protected by encryption and can only be accessed by you or your beneficiaries.

If Cipherwill gets hacked, can a hacker steal my data?

Even if a hacker gets into Cipherwill's backend, your data stays safe. That's because your info isn't stored there directly. It's kept in separate object storage and databases. So, breaking into the backend doesn't mean they can see your data.

Your Digital Will

Does your family know where you keep yourbitmojibitcoins or will they be lost forever?
Make sure they reach right people if you unexpectedly pass away.