Your Digital Vault is a platform for encrypting and sharing sensitive data. Using a unique system of key distribution, it allows users to protect their secrets while maintaining full control over access. The Vault leverages advanced encryption to ensure your data is only accessible to the people you trust.
Setting up a Vault
To set up a vault, you will need to choose a name for your vault and select the trusted contacts who will have access to it. You will then be given a set of keys to share with your trusted contacts. The number of keys required to unlock the data is configurable. You can set the number of required keys to be lower than the total number of keys generated. This ensures your data can still be unlocked if a key is lost.
When you share keys with your contacts, at least the required number of keys must be combined to unlock your encrypted data. Neither your original data nor the keys are stored after the keys are distributed (unless you choose "Keep Data").
Sharing a Vault
You can share your vault by sending an email to each of your trusted contacts with their corresponding key. You can create Vaults for yourself as well, not having to share keys. Accessing a Vault
If you have received a key to unlock a vault, you can go to the "Recovery" page and enter your key to begin the decryption process.
Hold Time
You can configure a waiting period time during which, after the required keys are provided, you will have the option to deny access. The hold time is set to one day by default, but it can be adjusted to hours or even minutes. If no action is taken within the hold time, the data will be unlocked automatically. Revoke Access
You can revoke access to your vault at any time by clicking the "Revoke Access" button. This will permanently delete all data in the vault and cannot be undone.
Warnings and Recommendations
Required Keys and Total Keys: Setting Required Keys equal to Total Keys requires all participants to provide their keys. If even one key is lost, the data will be permanently inaccessible. For more flexibility, choose a lower value for Required Keys (e.g., 2 out of 3 keys). For maximum security, it is not recommended to keep the original data. Only the encrypted data should remain, as it can only be reconstructed using the keys.
For additional questions or support, contact us at vault@codanotion.com