Don't just trust, verify
Every note, document, and file is encrypted using zero-knowledge encryption and threshold cryptography. You and your Trustees are the only ones who can decrypt your information with the keys stored in secure enclaves on your phone or desktop.
This system allows you to create cryptographically verified, fully customizable access control for your important information.
Scheduled Access
Set a specific future date when your vaults become accessible to Trustees or an expiration date after which access is revoked.
Collaborative Unlocking
You can require collaboration between two or more Trustees to unlock a vault.
Check-in Required
You can designate your vault to be unavailable unless you fail to respond to a check-in message from Chamber, sometimes referred to as a 'Dead Man Switch.'
![](https://framerusercontent.com/images/umxx6ClFM4pfznxMmXOhcgJHSw.webp?scale-down-to=4096)
Multi-Key Unlock
When you set up a vault for collaborative unlocking, we utilize threshold cryptography for extra privacy and security.
![](https://framerusercontent.com/images/BkG6hvgLg6hU9jcL1kw4X2gx0mc.png)