Benefactors manage their beneficiaries and their crypto credentials/wallets/folders/documents, all end-to-end encrypted. Benefactors can assign wallets and folders to these beneficiaries. The benefactor then activates a Dead Man's Switch timer on the Polygon blockchain through a smart contract and encrypts a symmetric key through NuCypher proxy re-encryption, the inheritance key we call it. When the DMS triggers after the specified time, and there has been no activity from the benefactor in this period, the beneficiaries are contacted via email with a secure link that initiates an ID verification (face scan and photo ID scan). The result of the ID check undergoes numerous checks for fraud through our partner, Au10tix.
After success and the beneficiary supplied the answer to a security question, our node gets the result. It computes an identity hash based on values like full name, gender, date of birth, nationality, etc., + the security question. In the enclaved node, the inheritance key, retrieved via NuCypher proxy re-encryption + the identity hash, unlocks the beneficiary key to access the wallets/folder that was assigned/encrypted to this beneficiary key, where the identity hash is the AAD to the AES-GCM algorithm, and therefore can't unwrap the beneficiary key if the identity is not correct. If the identity is correct, the beneficiary key is unwrapped and re-wrapped to the beneficiary's newly created account public key, and now has access to the shared info/documents.
The beneficiaries know nothing until the day the DMS is triggered. The benefactor registered all the beneficiary details beforehand to re-compute the identity hash for the beneficiary key wrap/unwrap together with the inheritance key. The beneficiary details are end-to-end encrypted at all times - inaccessible to the node and only accessible to the benefactor.
You can check the E2E code here: https://github.com/FortKnoxster/fortknoxster-crypto-web/blob/master/src/kryptos/wallets.js
Comments
0 comments
Article is closed for comments.