Security That Never Compromises
Your digital legacy is protected by multiple layers of security, from non-custodial architecture to audited smart contracts. We take security as seriously as you do.
0
Security Breaches
Since launch
4+
Security Audits
By leading firms
99.99%
Uptime
Platform availability
$50K
Bug Bounty
Maximum reward
Security Pillars
Four foundational principles that guide every security decision we make.
Non-Custodial Architecture
Your private keys never leave your control. We provide the infrastructure to execute your estate plan, but we never have access to your assets.
- Private keys remain in your wallet at all times
- No central point of failure or compromise
- Smart contracts execute without our intervention
- Full asset control until release conditions are met
Zero-Knowledge Proofs
Verify beneficiary identities and fulfill conditions without exposing sensitive personal data. Your privacy is protected at every step.
- Prove identity without revealing personal information
- Cryptographic verification of conditions
- No sensitive data stored on-chain
- GDPR and privacy regulation compliant
Audited Smart Contracts
Our smart contracts are audited by leading security firms and are fully open-source for community verification.
- Multiple independent security audits
- Open-source code on GitHub
- Bug bounty program with substantial rewards
- Continuous monitoring and testing
Multi-Signature Protection
Critical operations require multiple approvals, protecting against unauthorized access and single points of failure.
- Configurable multi-sig for releases
- Guardian system for recovery
- Time-locked administrative functions
- Separation of duties for platform operations
Security Features
Every layer of our platform is designed with security in mind.
Encrypted Data Storage
All sensitive data is encrypted at rest using AES-256 encryption
Secure Infrastructure
Hosted on enterprise-grade cloud infrastructure with SOC 2 compliance
DDoS Protection
Enterprise-level DDoS mitigation to ensure platform availability
Rate Limiting
Intelligent rate limiting to prevent abuse and brute-force attacks
Regular Penetration Testing
Quarterly penetration tests by independent security researchers
24/7 Monitoring
Round-the-clock security monitoring and incident response
Multi-Factor Authentication
Required MFA for all platform access with hardware key support
Geographic Redundancy
Multi-region deployment for high availability and disaster recovery
Security Audits
Our smart contracts and infrastructure have been thoroughly audited by industry-leading security firms.
CertiK
CompletedLeading blockchain security firm with expertise in smart contract auditing
Trail of Bits
CompletedElite security research firm specializing in high-stakes systems
OpenZeppelin
CompletedIndustry standard for smart contract security and best practices
Quantstamp
In ProgressBlockchain security company securing billions in digital assets
Security Milestones
Initial CertiK Audit
First comprehensive smart contract audit completed with no critical issues
Bug Bounty Launch
Launched public bug bounty program with rewards up to $50,000
SOC 2 Type II
Achieved SOC 2 Type II certification for security controls
Trail of Bits Audit
Second major audit by Trail of Bits with enhanced coverage
ISO 27001 Certification
Achieved ISO 27001 certification for information security management
Zero-Knowledge Integration
Implemented zero-knowledge proofs for enhanced privacy protection
Help Us Stay Secure
We believe in the power of community security. Our bug bounty program rewards security researchers who help us identify and fix vulnerabilities.
Report vulnerabilities responsibly and earn rewards:
- Smart contract vulnerabilities
- API security issues
- Authentication bypasses
- Data exposure risks
Bounty Rewards
Rewards are paid in USDC. Severity is determined by our security team based on impact and exploitability.
Certifications & Compliance
We maintain industry-leading certifications to ensure your data and assets are protected.
SOC 2 Type II
Certified compliant with SOC 2 Type II standards for security, availability, and confidentiality
ISO 27001
Information security management system certified to ISO 27001 standards
GDPR Compliant
Fully compliant with General Data Protection Regulation requirements
Security Questions?
Our security team is available to answer any questions about how we protect your digital legacy.