Protect your digital legacy. With a Dead Man's Switch.
Life is unpredictable. Accidents happen. Emergencies occur. Your crypto wallets, passwords, legal documents, and personal messages shouldn't disappear with you. A Dead Man's Switch ensures your trusted contacts get critical information when you can't respond—automatically, securely, privately. But that's not all. Here you can learn how it works, how it protects your digital assets through automated check-ins, and what happens when you miss one.
- Automated check-ins
- Unlimited trusted contacts
- Encrypted message storage
- Multi-channel delivery
What is a Dead Man's Switch?
The short version.
Crypto wallets, password vaults, legal documents, business credentials - all locked behind your knowledge. If something happens to you, your family may lose access to critical assets and information forever. That's a risk you can't afford to take.
You set a schedule - daily, weekly, or monthly. As long as you check in on time, nothing happens. Miss a check-in, and the system sends you reminders across all your channels before taking any action.
If you miss your check-in, you enter a grace period with escalating notifications. Lost your phone? On vacation? You have time to respond. This ensures the switch only triggers when you truly can't respond.
After the grace period expires without response, your encrypted messages and files are automatically delivered to your designated trusted contacts. They receive wallet recovery phrases, account credentials, legal instructions - exactly what you configured.
Designed to protect what matters
Choose daily, weekly, or monthly check-ins that match your routine. Change your schedule anytime as your needs evolve.
All messages and files are encrypted at rest and in transit. Your sensitive information stays private until delivery.
Receive check-in reminders through email, Signal, and Telegram. You'll never miss a notification.
Multiple reminder stages with increasing urgency prevent accidental triggers while ensuring reliable activation.
Add as many contacts as you need. Different contacts can receive different information based on your configuration.
Store and send encrypted documents, recovery phrases, passwords, or any files your contacts will need. We are actively building this now.
Send test deliveries to verify your contacts receive messages correctly before activating the live system.
We don't read your messages or files. Everything is encrypted end-to-end and only decrypted upon delivery.
No lock-in periods or cancellation fees. Pause or cancel your subscription whenever you choose.
FAQ
You have a question. That's good, you should always want to learn more about protecting your legacy. We've gathered a few things you might be wondering here. If you don't find your answer, let us know!