DecLegacy is not for everyone, however it is very likely that you will need it if you are interested in crypto world or you want to make sure that there is a legacy strategy behind your most important passwords.
Legacy contacts in password managers are often pretty complex feature. Your confidants will need to register and sometimes even install apps or browser extensions. Legacy features are often paid features which usually costs more then DecLegacy. It depends on value of your secrets but sometimes it makes sense to use multiple service in order to make sure that your digital life is never lost. Redundancy is important!
Some hardware wallets supports Shamir Secret Sharing which let's you split your private keys. This idea is great but this strategy is usually used in physical world completely. DecLegacy can help you go beyond this strategy and add virtual layer of security on the top of SSS.
Some hardware wallets supports Shamir Secret Sharing which let's you split your private keys. This idea is great but this strategy is usually used in physical world completely. DecLegacy can help you go beyond this strategy and add virtual layer of security on the top of SSS.
In order to improve the security and trust, we made DecLegacy an open source project but we would encourage you to NOT trust DecLegacy completely in order to improve your security! It's wise to avoid storing your most valuable secrets in a single physical or virtual location in order to prevent both physical theft or cyber attacks.
The simplest way to achieve this is to store the first half of your secret physically (e.g, in a bank safe). The second half can be stored virtually on DecLegacy.Your confidant should be informed about the location of the first half and the encryption password for the second half of the secret.
Even with all this information, your confidant cannot reveal the secret because DecLegacy safeguards the virtual portion until you are either deceased or unresponsive.We wrote an article which explains how and why this concept can be used in Bitcoin Legacy Strategy.
All encrypted secrets will be emailed to you immediately after any change is made. You can use a browser's JavaScript console to decrypt it - without DecLegacy. You can make sure that this content is accessible to the confidant by adding recovery email on your email provider service. That way it will be possible to reveal the secret via two different channels.
If you loose yor encryption password, we will not be able to help you to decrypt the content. We suggest adding multiple confidants to each secret to minimize the risk of losing the encryption password. DecLegacy allows you to verify that each confidant knows the encryption password without revealing the secret.