Questions About Inheriti®

The answers to your questions

Inheriti® is an online platform built on top of the Secure Share Distribution Protocol (SSDP), our patented protocol designed for secure, decentralized, and encrypted data management.

It facilitates the creation of decentralized and encrypted backup plans, offering users a secure way to manage sensitive data such as passwords, private keys, codes, recipes, and more.

Inheriti® provides users with control over their digital assets, ensuring security and accessibility through advanced blockchain technology and smart contracts.

Inheriti® is not a traditional password manager in the sense of automatically logging you into accounts or storing passwords in a browser extension.

Instead, it offers a comprehensive solution for creating decentralized and encrypted backup plans, which can include passwords and accounts, among other types of sensitive data.

Users must go through a merging process to decrypt data, ensuring added security compared to regular password managers.

Inheriti® is not a cloud service in the traditional sense. It is an online platform built on top of the Secure Share Distribution Protocol (SSDP), enabling secure transfer and management of data in a decentralized and encrypted way.

While users access Inheriti® through a browser, the platform itself is not a centralized cloud service but rather a frontend for the advanced technology of SSDP.

Inheriti® is designed for individuals, families, estate planners, business owners, content creators, lawyers, notaries, and more, who seek a secure and user-friendly solution for managing their digital assets.

Whether it’s personal passwords, business accounts, cryptocurrency keys, or digital legacies, Inheriti® offers a versatile platform to protect and manage sensitive data.

Inheriti®’s use cases include creating decentralized and encrypted backup plans for sensitive data such as passwords, private keys, codes, recipes, and more.

Users can also use Inheriti® for digital inheritance planning, ensuring the smooth transition of digital assets to chosen heirs. Additionally, Inheriti® offers a secure solution for managing cryptocurrency keys and protecting personal and business data.

Inheriti® works through a four-step process:

  • Plan Configuration
  • Splitting and Encrypting
  • Share Distribution
  • Data Retrieval

Users start by configuring their protection plan, then their data is split into encrypted shares using advanced encryption protocols.

These shares are distributed across different storage layers, ensuring decentralization and redundancy.

When needed, beneficiaries can merge their shares to retrieve the original data securely.

Pricing varies based on the plan configuration and specific features chosen.

See full pricing

Users can pay for Inheriti® protection plans using fiat currency or SHA tokens via different blockchains and wallets.

This provides flexibility for users to choose their preferred payment method for accessing Inheriti®’s secure data management solutions.

While Inheriti® itself does not have a dedicated mobile app, the platform is accessible and fully functional through a mobile browser. This allows users to access and manage their protected data on-the-go, ensuring flexibility and convenience.

Additionally, SafeKey Mobile serves as the mobile alternative to SafeKey Pro, allowing users to store Inheriti® plan shares securely on their mobile devices.

No additional hardware purchase is required to use Inheriti®. However, users have the option to enhance security by purchasing a SafeKey Pro device, which serves as a secure cold storage solution for storing Inheriti® plan shares.

While not mandatory, the use of SafeKey Pro provides an additional layer of security, especially for those concerned about protecting their digital assets.

Yes, Inheriti® is built on blockchain technology and utilizes smart contracts to ensure the security and immutability of data.

The platform leverages multiple different blockchains, allowing users to choose their preferred blockchain for storing validator and backup shares of protection plans.

This decentralized approach enhances security and transparency, providing users with peace of mind regarding the integrity of their digital assets.

Inheriti® is built on multiple different blockchains, offering users flexibility in choosing their preferred blockchain for storing validator and backup shares of protection plans.

Blockchains we plan to include are vechain, Ethereum, Optimism, Polygon, BNB Chain, Base and more.

This multi-chain approach ensures compatibility and scalability, accommodating a diverse range of user preferences and requirements.

SafeKey Pro is a specialized hardware device that provides robust cold storage for your plan shares, enhancing security by keeping them offline.

It provides an additional layer of security for users who prefer a physical storage solution for their digital assets. SafeKey Pro ensures the safekeeping of sensitive data, protecting it from unauthorized access and potential security threats.

SafeKey Mobile is the mobile alternative to SafeKey Pro, offering users a convenient way to store Inheriti® plan shares securely on their mobile devices.

It serves as a mobile app that allows users to claim, store and release their encrypted plan shares on-the-go, providing flexibility and convenience for mobile users.

SafeID is SafeTech’s Single Sign-On (SSO) solution, used across the ecosystem to provide users with a seamless login experience.

It allows users to log in to both Inheriti® and SafeKey Mobile using a single set of credentials, enhancing convenience and security.

SafeID ensures a unified login experience, streamlining access to protected data and digital assets within our ecosystem.

Inheriti® uses a multichain token called SHA (Safe Haven), which is incorporated into the platform’s smart contracts.

When creating a protection plan through Inheriti®, the smart contract ALWAYS requires SHA tokens as part of the transaction and plan creation process.

Users can pay for protection plans using fiat currency or SHA tokens via different blockchains and wallets.

Through SafeSwap.io, users can easily swap SHA tokens across different blockchains such as vechain, Ethereum, Optimism, Polygon, BNB Chain, Base and more to come.

To create an account (SafeID) for Inheriti®, simply visit the webapp and initiate the registration process.

During registration, you will be prompted to provide your email address and a secure password.

Upon completion, a SafeID will be automatically created for you via SafeTech’s Single Sign-On (SSO) solution, ensuring a seamless and secure login experience across both Inheriti® and SafeKey Mobile.

Note: a SafeID can also be created via the SafeKey Mobile app, or directly via the SafeID website. Your SafeID works across the whole ecosystem.

To start using Inheriti®, you will need a valid email address and a secure password to create your SafeID account.

Additionally, you will need either SafeKey Pro or SafeKey Mobile to store your encrypted plan shares. These devices are essential for securely managing and accessing your protected data within Inheriti®.

SafeID, created during the registration process, serves as your login credential for accessing both Inheriti® and SafeKey Mobile.

SafeID is essential for accessing Inheriti® and is created automatically during the registration process.

It serves as your login credential for the platform, providing a secure and seamless Single Sign-On (SSO) experience across the ecosystem.

SafeID ensures that your account is protected and accessible only to you, enhancing security and convenience when accessing your protected data.

No, you do not need a crypto wallet to use Inheriti®. You can easily use the Standard Edition for Web2 and pay with fiat currency.

However, if you prefer to pay with SHA tokens directly and use crypto, then you will need a crypto wallet such as Comet (our own wallet, for the vechain network) or Metamask (for Optimism and Ethereum), for example.

Having a crypto wallet can be beneficial for certain features and payment methods within Inheriti®, for example if you are a SafeNode owner, but it is not required to use the platform.

If you forget your login information for Inheriti®, including your SafeID credentials, you can initiate the password reset process.

Simply click on the “Forgot Password” link on the login page and follow the instructions provided. You’ll be prompted to enter the email address associated with your account, and a password reset link will be sent to you via email.

Follow the link to reset your password and regain access to your account.

While not mandatory, having a SafeKey Pro device can enhance the security of your Inheriti® account.

SafeKey Pro serves as a secure cold storage solution for storing encrypted shares of protection plans, providing an additional layer of security for your digital assets.

It’s especially recommended for users who prioritize maximum security for their sensitive data.

Yes, either SafeKey Pro or SafeKey Mobile is required to start using Inheriti®.

SafeKey Mobile serves as the mobile alternative to SafeKey Pro, allowing you to securely store Inheriti® plan shares on your mobile device.

Each user, including beneficiaries and shareholders of protection plans, will need either SafeKey Pro or SafeKey Mobile to store their encrypted plan shares securely.

Yes, Inheriti® is designed to work on modern computers with internet access, supporting all major browsers for seamless operation.

Yes, Inheriti® is accessible and functional on mobile devices as well. While there isn’t a dedicated mobile app for Inheriti®, the platform is optimized for mobile browsers, allowing you to access and manage your protected data on-the-go.

Additionally, you can use SafeKey Mobile as a mobile app to store Inheriti® plan shares securely on your mobile device.

To change your password or email address associated with your Inheriti® account, you’ll need to use SafeID.

You can access your SafeID profile through the “My Inheriti” page or directly through the SafeID website.

Remember that any changes made to your SafeID profile will apply to both Inheriti® and SafeKey Mobile, as they share the same SafeID.

To delete your Inheriti® account, navigate to your “My Inheriti” page and click the red “Delete Inheriti® account” button.

Keep in mind that by deleting your Inheriti® account, you’ll lose access to your dashboard and all your protection plans. If you reactivate your account within the next 6 months, you can still recover your data.

However, after 6 months, all your data and protection plans will be permanently destroyed.

If you proceed with deletion, you will be logged out and lose access to your Inheriti® account unless reactivated within 6 months.

Just remember that deleting your Inheriti® account will not affect your SafeID account, and your account info will still be available there.

Currently, it’s not possible to edit existing protection plans in Inheriti®.

While it may be possible to make changes in the future, it’s important to understand that Inheriti® is a decentralized solution that utilizes blockchain technology.

This means that encrypted shares of your data are distributed across different locations and on the blockchain, making it impossible to edit those shares directly.

However, other configuration settings might become editable in the future.

If you need to make changes to your plan, the best approach is to destroy your current plan and create a new one.

Deleting your personal information from Inheriti® is essentially the same as deleting your Inheriti® account.

However, keep in mind that your SafeID account and information will still be available.

If you want to delete all your data completely, including your SafeID account, you should also delete your SafeID account, as it serves as the base account of our ecosystem.

A Data Backup Plan is a protection plan meant for those desiring to make a “decentralized backup” of their digital data, alone, or together with other shareholders.

The data that can be protected with a Data Backup Plan is the same as with a Digital Inheritance Plan, but its plan properties are different.

This plan type allows for flexibility in managing and protecting sensitive information, making it ideal for those who wish to maintain control over their digital assets, either individually or in collaboration with trusted partners.

Creating a data backup plan with Inheriti® is simple and straightforward. After logging into your account, navigate to the “Protection Plans” section and select the option to create a new data backup plan.

You’ll be guided through the process of configuring your protection plan, where you can specify details such as your trusted shareholders, storage layers, preferred blockchain, and plan triggers.

Once configured, your data will be split into encrypted shares and distributed securely according to your plan settings.

Inheriti® allows users to back up a wide range of data, including but not limited to passwords, private keys, cryptocurrency wallets, card details, account credentials, secret recipes, API keys, and other sensitive information.

Whether it’s safeguarding important account details, preserving cherished memories, or protecting business-critical data, Inheriti® offers a versatile solution for securing various types of digital assets.

Data backups with Inheriti® are highly secure and resilient against breaches. The platform utilizes advanced encryption algorithms and the Secure Share Distribution Protocol (SSDP) to split, encrypt, and distribute data across multiple secure locations or devices.

This decentralized approach ensures that there is no single point of failure, making it extremely difficult for unauthorized parties to access or tamper with the encrypted shares.

Additionally, users have full control over their protection plans, with options for multi-layered verification and security protocols to further enhance data security.

To restore data from a backup plan in Inheriti®, you need to initiate the merging process as the Merge Authority (MA).

If you’re both the plan owner and Merge Authority, you can do this via the Inheriti® dashboard. However, if you’re not the plan owner, go to the Inheriti® login page and click the merge button.

This will take you to the public merging page, where you can choose to initiate merging via SafeKey Pro (by plugging the device into your computer) or scan a QR code with SafeKey Mobile to release the shares.

Once merging is initiated, the plan triggers verify if the plan owner approves the merging. If approved, gather all other shareholders to load their shares into Inheriti®, so they can be merged and reveal the data.

Inheriti® does not impose strict limits on the overall amount of data you can back up.

However, there is a limit of 500 characters per protection plan. This means that while you can create multiple protection plans to back up your data, each individual plan is restricted to 500 characters of encrypted data.

It’s essential to consider this limit when configuring your protection plans and optimizing your data backup strategy within Inheriti®.

The best way to delete a backup in Inheriti® is to access the backup plan through your account dashboard and click the “Destroy” button.

This action initiates the process of making the plan unrecoverable by deleting or overwriting the shares and configuration associated with it.

While some shares may still exist, such as those stored on beneficiaries’ devices or on the blockchain, the “Destroy” action ensures that the backup plan becomes unrecoverable and inaccessible.

Once destroyed, the Merge Authority cannot initiate the merging process, and the data becomes effectively irretrievable.

It’s important to note that while some shares may persist, they are worthless on their own and do not compromise the security of the data.

These plans are crucial for managing digital legacies, ensuring that your digital assets are passed on according to your wishes with high security and compliance.

Ideal for users who are preparing for the future management and transfer of their digital assets after their lifetime.

Use when you need a secure plan to pass on digital assets like cryptocurrencies, digital wallets, and other sensitive digital data to designated heirs according to your wishes.

Creating a digital inheritance plan with Inheriti® is a seamless process.

Begin by logging into your account and navigating to the “Protection Plans” section. Select the option to create a new digital inheritance plan to initiate the configuration process.

You’ll be guided through configuring your inheritance plan, where you can specify essential details such as your trusted heirs, merge authority, and one or more Dead Man Switches as additional security layer.

Additionally, you can define the types of digital assets you wish to include in the inheritance plan, such as cryptocurrency wallets, passwords, online accounts, card credentials, and other sensitive data.

Once configured, your plan will be ready to safeguard your digital assets and ensure their smooth transfer to your chosen heirs according to your wishes.

Inheriti® offers flexibility in making various types of digital data inheritable, ensuring comprehensive protection for your digital assets.

You can include a wide range of sensitive information, such as cryptocurrency wallet private keys, passwords, account logins, card credentials, and personal data, among others, in your digital inheritance plan.

Ensuring access to your data only when necessary is paramount, and Inheriti® provides an additional security layer to facilitate this.

Activation methods such as the Dead Man Switch allow you to set conditions for data access, ensuring that your digital assets are accessible to designated beneficiaries only under specified circumstances, such as your incapacitation or passing.

In a digital inheritance plan with Inheriti®, the Dead Man Switch serves as a critical mechanism to ensure the secure management and transfer of your digital assets in the event of your incapacity or passing. Unlike active approval methods, such as plan triggers, the Dead Man Switch operates on the principle of passive approval, triggered by a lack of specific actions within a predetermined timeframe.

For example, if the plan owner fails to log in to their account, click a link, or enter a verification code received via SMS within the specified timeframe, it indicates inactivity and triggers the Dead Man Switch. This activation signals the system to initiate the inheritance process, facilitating the secure transfer of assets to designated heirs according to the plan owner’s wishes.

By providing a safeguard against prolonged inactivity or incapacitation, the Dead Man Switch ensures that your digital assets are managed and transferred securely, even in the absence of active approval from the plan owner.

This feature enhances the reliability and effectiveness of digital inheritance plans in safeguarding your digital legacy with Inheriti®.

Digital inheritance plans with Inheriti® are engineered with the highest standards of security to safeguard your valuable digital assets. Your data remains completely private and under your control throughout the entire process, as Inheriti® never accesses or stores your data.

When you create a digital inheritance plan, your data is encrypted directly within your browser, ensuring that it never leaves your device in unencrypted form. This encrypted data is then split into shares and distributed across multiple secure layers, utilizing Inheriti®’s Secure Share Distribution Protocol.

As the plan owner, you maintain full control over the opening of the plan through the Dead Man Switch, which acts as a fail-safe mechanism to prevent unauthorized access or merging of data. You have the power to abort or reject the merging process at any time, ensuring that your data remains secure and inaccessible to unauthorized parties.

Moreover, Inheriti® employs a multi-layered approach to eliminate single points of failure. Even if one or more shares are compromised, the merging threshold and backup shares ensure that your data remains recoverable. Each share contains only encrypted fragments of your data, providing an additional layer of security against unauthorized access.

Inheriti®’s innovative security measures, combined with its decentralized architecture and user-controlled access, ensure that your digital inheritance plans are fortified against breaches and unauthorized access, providing you with peace of mind regarding the protection of your digital legacy.

If you’ve lost your password for your Inheriti® account, don’t worry, you can easily reset it.

Just keep in mind Inheriti® is connected to your SafeID account. SafeID is the gateway to the entire ecosystem, including Inheriti® and SafeKey Mobile.

So simply initiate the password reset process via Inheriti®, SafeKey Mobile, or SafeID, and follow the provided instructions to securely reset your password and regain access to your account.

In the unlikely event of SafeTech’s discontinuation, we are committed to safeguarding our users’ interests and assets.

Should such a scenario arise, we will initiate proactive communication with all users to address the situation. Users will be contacted well in advance, providing ample time to evaluate their protection plans and explore alternative options.

It’s important to note that even in such a situation, no one will ever have access to your encrypted data. Your data remains secure and uncompromised.

However, if SafeTech ceases to exist, the configuration and infrastructure supporting your protection plans may be affected, making it impossible to merge shares and access your protected data.

Rest assured, we will provide guidance and support throughout this process to ensure the best possible outcome for our users.

If there aren’t enough shares available to meet the merging threshold, the merging process cannot proceed.

Inheriti® requires a minimum number of shares (set by the plan owner) to be present and verified before data can be merged and decrypted.

In such cases, it’s essential to ensure that a sufficient number of verified shares are accessible to meet the merging threshold.

The Merge Authority may need to coordinate with other shareholders or beneficiaries to obtain the required shares for successful merging.

If the Merge Authority (MA) becomes unavailable, it’s important to have contingency plans in place. As the plan owner, you can create a new plan and designate a new Merge Authority to ensure continuity.

Additionally, encourage your Merge Authority to create their own inheritance plan with instructions for transferring their responsibilities in case of their unavailability or passing.

This proactive approach ensures seamless management and transfer of digital assets even in unexpected circumstances.

Losing your SafeKey Pro device can pose challenges, especially if no backup devices were made.

If a beneficiary loses their SafeKey Pro device, the impact depends on the merging threshold set by the plan owner.

If the threshold can still be met with remaining shares and the available backup shares, data access is preserved. Otherwise, the loss may lead to data inaccessibility.

To mitigate the risk of losing access to your shares, always keep backups of your SafeKey Pro device and create identical copies by restoring backups onto additional devices.

If your SafeKey Pro has reached its storage limit, consider acquiring additional SafeKey Pro devices to expand your storage capacity.

Resetting your SafeKey Pro to clear storage should be approached with caution, as it permanently deletes all shares. This action may render related plans inaccessible if the merging threshold cannot be met.

Always ensure adequate backup options and consider creating duplicate SafeKey Pro devices to prevent data loss.

You can easily check whether your Inheriti® share on your SafeKey Pro device is still part of an active protection plan by using the “SafeKey Pro” page in Inheriti®.

Simply connect your SafeKey Pro device to your account, and you will be able to view all the shares stored on it and the protection plans associated with them.

This allows you to verify the status of your shares and ensure they are still part of an active plan.