Upon vaults are always end-to-end encrypted, and are the only encrypted inheritance vault provider with a public whitepaper.
Straightforward security for protecting your digital estate.
Trust the cryptography
Cryptography is more secure than infrastructure. Upon enforces security guarantees via cryptography over systems.
Intentional privacy
We can't mishandle data we never have access to. Upon is designed to minimise our collection of and access to sensitive data.
Openness
Explain the security design of Upon to allow others to understand and critique our decisions.
Upon vaults are only ever accessible by vault owners and their beneficiaries. Even Upon cannot read your vault.
Only you and your beneficiaries can access your vault data. The vault is encrypted with keys that only you and your beneficiaries possess, meaning no third party can ever read your data, even Upon.
Your vault key is split between your beneficiaries, meaning a minimum number of your beneficiaries are required to reconstruct the full key together to decrypt your vault.
Users have both a memorable password and a secret key, and these are combined and stretched using Argon2id to derive user's authentication and encryption keys. The separate 128-bit secret key is randomly generated to provide brute-force attack resistance and supplement the lower entropy of most user passwords.
A user's key store contains vault encryption keys, and the user's Ed25519 and Kyber1024 keys. The user's key store is encrypted with Chacha20Poly1305 using a user's encryption key derived from their password and secret key via 2SDK, ensuring only the user has access.
Vault encryption keys are generated client-side with a cryptographic random number generator, and are used to encrypt vault data using Chacha20Poly1305.
Vault intermediate keys are client-side generated and are used to encrypt the primary vault encryption key with ChaCha20Poly1305. An intermediate key is used to allow changing the beneficiaries without re-encrypting the vault; and allow re-encrypting the vault without changing the beneficiary shares.
The vault intermediate key is split using Shamir's Secret Sharing algorithm to create key shares for each beneficiary. Key shares are transmitted by creating a shared secret from the vault owner and beneficiary Ed25519 and Kyber1024 keys in a quantum-resistant hybrid arrangement. This shared secret is then stretched and used to encrypt the key share using ChaCha20Poly1305.
After the release of the vault, beneficiaries send their key share to all other beneficiaries following the same quantum-resistant shared-secret arrangement. This cryptographic setup ensures a single beneficiary cannot decrypt a vault alone, even with full access to the encrypted data. The Upon systems are also designed to ensure that beneficiaries aren't given access to the encrypted data or key shares until necessary.
Upon vaults are always end-to-end encrypted, and are the only encrypted inheritance vault provider with a public whitepaper.
No, we cannot access your data. Your data is end-to-end encrypted, meaning only you can access your vault data. Even after release your vault data remains encrypted, and only your beneficiaries will be able access your vault data.
A single beneficiary cannot decrypt your vault data alone. Only after a minimum number of your beneficiaries have agreed to release the vault will each beneficiary be able to reconstruct the vault key.
Beneficiaries will need to have created an Upon account to be able to access your vault. They will be prompted to create a free beneficiary account when invited to be a beneficiary for the first time.
Ensure that your memories and assets will be passed on to your loved ones. Create your inheritance vault today and rest easy knowing your legacy is secured.