Usage Guides

SecureInheritance Usage Guide

SecureInheritance helps you create plans to securely transfer digital assets to trusted beneficiaries. Shamir's Secret Sharing splits encryption keys so assets are only recoverable when conditions are met.

Step 1: Access SecureInheritance

Select 'SecureInheritance' from the 'Products' menu or enter /inheritance. Login is required.

Step 2: Create an Inheritance Plan

Click 'New Plan'. Enter a name and description. Choose a trigger type: 'Manual' (you trigger it), 'Inactivity' (auto-trigger after set days of inactivity, 7-1095 days), 'Date' (trigger on specific date), 'Multi-condition' (combined conditions). Set Shamir parameters: threshold (minimum shares to recover) and total shares.

Step 3: Add Beneficiaries

In the plan detail page's 'Beneficiaries' tab, add beneficiaries. Enter name, email, and relationship (family/friend/lawyer, etc.). Each beneficiary receives a Shamir key share with an auto-assigned share_index. Duplicate emails within a plan are not allowed.

Step 4: Register Digital Assets

In the 'Assets' tab, click 'Add Asset'. Enter label, asset type (account/document/crypto_wallet/financial/other), and data to deliver. Data is encrypted with AES-256-GCM using your encryption password. Select beneficiaries for each asset via checkboxes.

Step 5: Review Trigger Settings

In the 'Settings' tab, review trigger conditions, Shamir configuration, and danger zone. For inactivity triggers, the last activity time is shown—activity must be recorded periodically.

Step 6: Activate the Plan

Once everything is set, click 'Activate' in the 'Overview' tab. Trigger condition monitoring begins. Status flow: Draft → Active → Triggered/Cancelled → Completed.

Understanding Shamir's Secret Sharing

Shamir splits an encryption key into N shares where only M shares are needed to reconstruct the original. Example: total_shares=5, threshold=3 means any 3 of 5 beneficiaries can recover assets. No single beneficiary can access assets alone.

Digital Legacy Tips

  • -Set threshold lower than total shares so assets are recoverable even if some beneficiaries are uncooperative.
  • -For inactivity triggers, record activity regularly to prevent unintended activation.
  • -Inform beneficiaries about the system and their role in advance.
  • -Distribute important assets across multiple plans to spread risk.
  • -Review thoroughly in draft status before activating. Some settings are restricted after activation.