Don't just trust, verify
Every note, document, and file is encrypted using zero-knowledge encryption and threshold cryptography. You and your Trustees are the only ones who can decrypt your information with the keys stored in secure enclaves on your phone or desktop.
This system allows you to create cryptographically verified, fully customizable access control for your important information.
Set a specific future date when your vaults become accessible to Trustees or an expiration date after which access is revoked.
You can require collaboration between two or more Trustees to unlock a vault.
You can designate your vault to be unavailable unless you fail to respond to a check-in message from Chamber, sometimes referred to as a 'Dead Man Switch.'
When you set up a vault for collaborative unlocking, we utilize threshold cryptography for extra privacy and security.