Image for post
Image for post

Under the Guidance of the Community Governance Model

The Community Governance Model (CGM) will act as the compass guiding Safe Haven’s direction in regards to community fulfillment.

A group of highly diverse individuals volunteering to maintain the bridge between community and organization, the CGM will engage with Safe Haven directly in efforts to maintain community-leaning growth.

Beyond maintaining a Legacy Node, an individual’s acceptance into the CGM will be voted on by the standing members, less any members of the Safe Haven organization. The official standing vote required for acceptance into the CGM will be determined by the standing COVE membership, as this organization will be ‘grandfathered’ as the CGM — this determination will be made public, thereafter and will remain such if/until changed by the CGM. …


Image for post
Image for post

Several years have gone into the release of such an elaborate platform. Hours of dedication to the technical, legal, and business development have been spent to get us here. Every one person who ever joined our telegram, ‘liked’ our Twitter account, or dedicated their time to testing the platform, we are in your debt and we can only hope that our success is your success.

Now that we are here, let’s discuss what Inheriti really brings as a solution…

At its core, the Community Edition (CE) is decentralized data inheritance in its truest form. Inheriti utilizes blockchain and the patent-pending SafeKey technology to safely distribute encrypted shares of information onto cold-storage devices. To decrypt this data, SafeKey holders must come together and then merge the shares utilizing Inheriti. Only at this point, would the beneficiaries have any knowledge of the information stored [by the plan initiator] in conjunction with the smart-contract on the blockchain. For the merge to occur -this transfer of data-, the party responsible known as the Merge Authority must initiate the process, potentially triggering several deadman switches (DMS) established by the initiator. Should the initiator not intend for the information to be obtained by the beneficiaries, he/she would simply respond to their security DMS features selected. …


Image for post
Image for post

This small write-up explains the importance of the Personal Identification Number (PIN) length and covers -in a nutshell- the efforts we invested in some aspects of our SafeKey related security features.

The PIN is similar to password in a way, but differs in complexity and use case. PIN is a short string of characters, easy to remember for the user. On the contrary to the password, PIN cannot be ‘brute-forced’ (that is, all combinations of characters cannot be checked) due to limited attempts the user would be asked for it. For FIDO2, the device will ask for the PIN 8 times, after which it will go to a ‘blocked’ state, disallowing further use of the device until it will be reinitialized (all user data, including attempts counter and the current PIN, will be cleared). For FIDO2 PIN, minimal length defined in the FIDO2 standard, is 4 bytes, and maximum is 63. This means it can hold 63 ASCII characters, or 15 (63/4) 4-byte wide Unicode characters (e.g. UTF-32). FIDO2 standard defines the PIN to be UTF-8 encoded, however device accepts any form, and is encoding agnostic (it compares binary data). FIDO2 PIN is required for FIDO2 registration and authentication actions, as well as using the Resident Keys feature. Since FIDO2 PIN is used for the Custom Storage (CS) access (it is possible to decouple it), it will be required as well for each login action to the CS, to use its features. Despite using FIDO2 PIN, all transport is still conducted through FIDO U2F layer, where the custom commands are sent. Simply, FIDO2 PIN is sent through FIDO U2F using the custom command. At no time is FIDO2 used to call CS commands. …


Image for post
Image for post

It is with great pleasure that we announce a collaboration between Safe Haven and the Matic Network!

In an effort to expand decentralized finance and digital inheritance services throughout India, Safe Haven and Matic will be pushing Inheriti to the masses. Inheriti, Safe Haven’s flagship solution for digital inheritance allows family members, businesses, and/or stakeholders to access and distribute assets upon a user’s passing or at the end of a time-locked contract. …


Image for post
Image for post

Today, the sixth and also last randomized drawing of twenty (20) SHA addresses for our “All Eyes on Inheriti Lottery Event”, has been completed. The addresses were pulled using a simple program to ensure randomization. The winning wallet addresses that have been selected will receive a SHA token distribution according to the level of Safe Haven held within the wallet in the next 48 hours. See the winners below:

Winning wallets of 500 SHA

0x8062de3523612344a385ff05e051a3cef53cb3c7

0xf7f79FBBA20006003549d8468490c1A433D9c3e3

0xe1391077513C6559e18a33A2d790B0EcADcF9735

0xDd079eDbD1ba02f8aF904A9dD4896eA83Ba3b3fe

0x40b15Ef6B73C3e2C08a32852457612bB315aBAa3

0x9A6996f07223622B3A60955391a712a9f7579e01

0x7e983B46AefFb5843F600c2A317497d7791E8b26

0xddD93F947414897150b7013Bf18C596aaD684536

0xA1b3AfE1Ee4558D2c747B8EFCCBB9d781A5DE05f

0xCbF5314031fbF46fa077bAdD4a90603653185a19

0xb19c667aFF02C1B5F65b0705Cb4F17A826BEe909

0x919c271F3A60BDb5CD834d18D1A2BF93b02c738c

Winning wallets of 1,000 SHA

0x00C6a2E575b7cCC41f8597D7a6286499aAf31501…


Image for post
Image for post

Chief Executive Logino Dujardin, recently announced a formal 24-month agreement struck with Intigriti, Europe’s #1 ethical hacking and bug bounty platform. Founding Director and Chief Technology Officer, Jürgen Schouppe orchestrated the efforts to ensure the necessary long-term audit required of a platform such as Inheriti.

Why Intigriti?

Intigriti maintains a network of over 15,000 white-hat hackers with varying levels of experience. Due to its [network] size, Intigriti can virtually provide 24/7 continuous pen-testing. Every participant within the Intigriti network is verified and vetted to ensure only the most professional of those interested are selected. …


Image for post
Image for post

Dear KuCoin and Safe Haven Users,

KuCoin and Safe Haven are extremely proud to announce the listing of Safe Haven. Safe Haven (SHA) is now available on KuCoin. Supported trading pairs include SHA/USDT and SHA/BTC.

Please take note of the following schedule:

  • Deposits Effective Immediately
  • Trading SHA/USDT : 18:00 on August 25, 2020 (UTC+8)
  • Trading SHA/BTC : 18:00 on August 25, 2020 (UTC+8)
  • Withdrawal: 22:00 on August 28, 2020 (UTC+8)

Safe Haven is a DeFi Platform that supports companies and blockchain projects, aiding their expansion within their dApps. Safe Haven builds solutions for the management of digital assets. …


Image for post
Image for post

Today, the fifth randomized drawing of twenty (20) SHA addresses for our “All Eyes on Inheriti Lottery Event”, has been completed. The addresses were pulled using a simple program to ensure randomization. The winning wallet addresses that have been selected will receive a SHA token distribution according to the level of Safe Haven held within the wallet in the next 48 hours. See the winners below:

Winning wallets of 500 SHA

0x035c20df2cdd7f9c1f8a20bc13de4326be4ce2c1

0xba8504e4df92bbe91ac0448c5cda9fe48a41abba

0xe9c459304a3226bb62bc8b3ddaae10294fe1f457

0x3de1259ab0ba8077eee313830b2e07c8c3582044

0xf5ed5b851ee197bd821d187e8ed321b5a85eeac5

0x9d2f5C2183C1b6370E21eEE3D0d3dDb04d01c780

0x8539699c2e640d325372514e4cee3653c15fe38a

0xe1cb0722e30a3d01b76cbab013edf0509899cd29

0x062bbF93a1e634fb1615dbD748Ed3BE9732bbE2A

0xe1391077513C6559e18a33A2d790B0EcADcF9735

0x62ac98c3670E22752C4284FDCbaa453DB8C3F715

0xa06a33bDE3816ADbC927F930c8236c2Db3706675

Winning wallets of 1,000 SHA

0x4b74d1d5B944a51e6df76af57482c438f185b181


Image for post
Image for post

As you probably already know, our first live edition of Inheriti -the world’s first 100% multilayer, decentralized Inheritance platform- is web browser-client based driven, using JavaScript libraries that are built in order to give our users a secure way of transferring digital assets while holding custody of their assets. Nevertheless, as its client based, our users should take some security recommendations into consideration. If you desire to use a third-party platform which does not control your assets [Inheriti] and as such does not maintain the custody of your data, it’s up to you as the user to maintain full responsibility of the former. …


Image for post
Image for post

Logino Dujardin, CEO of Safe Haven will host his first round table discussion on August 24, 2020 at 6PM CEST. The general purpose of a roundtable is to hold a discussion and exploration of a specific topic, in this case Safe Haven and its recent accomplishments and announcements. A roundtable, holding all participants on equal footing, aims to confront issues rather than people.

Logino will host the round table and have an open discussion with 5 community members via ZOOM. The discussion will be recorded and released to the entire community approximately 48 hours after the event.

* Safe Haven NODE holders have priority in participation. …

About

Safe Haven

Home For Crypto Financial Needs

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store