Inheriti Deep-Dive Series // 005 : Introducing Inheriti — An Overview of Key Features and Benefits

Inheriti Logo.

#1 — Multi-Purpose Capability (Digital Inheritance and Personal Backups)

#2 — Multi-Wallet Storage

  • The current version allows storage of up to 500 characters, which means you can store seed phrases and passwords for multiple crypto wallets or exchange accounts
  • Inheriti isn’t limited to crypto based information also — you can use it to store secret family recipes, industrial formulas, GPS coordinates and so on.
  • The forthcoming release of Inheriti Vault will significantly increase the amount of data you can store, so you can choose to protect digital assets of almost any size including documents, images and even videos.

#3 — Fully Decentralized

Inheriti & Red4Sec Security Audit banner.

#4 — Fragmentation of Data

Safe Haven’s SafeKey Devices.
Safe Haven’s Own FIDO2 / U2F ‘SafeKey’ Hardware Security Module (HSM) Cold-Storage Devices

#5 — Multi-Storage Layers

#6 — Top-Level Security Protocols and Encryption

  • Inheriti’s client-based top-layer is written in Javascript which has certain in-built security features such as preventing reading and writing to disk, not allowing access to other browser windows or domains, and not allowing any actions that are not permitted by the browser itself.
  • All SafeKeys (and the data held within them) are protected by PINs that are stored using complex, salted SHA-256 hashing algorithms (preventing cleartext access) and a maximum PIN attempt counter that prevents brute force and rainbow table attacks.
  • All private key ‘share’ data that is stored on either the blockchain or on SafeKeys is encrypted (in-motion or at-rest) using the AES256 encryption standard — the first (and only) publicly accessible cipher approved by the NSA for information classified Top Secret. As of 2021, all known attacks appear to render a brute-force search of the key space infeasible on foreseeable classical and quantum computers.
  • Safe Haven maintains an ongoing commitment to undertake regular independent security audits with some of the best cybersecurity specialists around (including Red4Sec).
Graphic showing 2 year Bug Bounty Programme between Safe Haven and Intigriti.
  • Safe Haven is also undertaking a 24-month bug bounty campaign to ensure the ongoing security of the Inheriti platform in association with Intigriti, Europe’s premier ethical hacking and bug bounty organization.

#7 — Protection against Fraudulent Data Release

  • When the recovery process to ‘merge’ the previously fragmented private key ‘shares’ is initiated, Inheriti will invoke various ‘Dead Man Switch’ (DMS) mechanisms that request you to respond within a set time period using a combination of methods (such as platform login or email responses).
  • As the Owner of the Estate, this affords you significant peace of mind as you are given multiple opportunities to confirm “I’m not dead yet”.
  • Only when no responses are received within the allotted period, will the platform release the all-important ‘Validator’ share from the blockchain so the merge process can commence.
  • At this point, the required number of Beneficiaries must also then come together with each of their shares on their separate SafeKey devices — before the shares can be recombined and decrypted — and the private key data revealed.

#8 — Optional Legal Professional Involvement

Graphic showing details of three worldwide Patents Pending.
Safe Haven Have Several Patents Pending in the US, Europe and China
Graphic showing Inheriti banner




Safe Haven provides advanced FinTech solutions powered by blockchain, and our own patent-pending protocols along with our ‘SafeKey’ HSM cold-storage devices.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

{UPDATE} LAYTON'S MYSTERY JOURNEY – BP Hack Free Resources Generator

Get Control, Get the Ledger Nano S/X Wallet Secure Your CL Coins

AssetFi x CyberFi Samurai Partnership

NFTs and off-chain security

Cross-Site Request Forgery (CSRF)Protection-Synchronizer Token Pattern.

My First Blog Ever

💧 X Swap Protocol Airdrop 💧

Impact of COVID-19: IoT Operating Systems Market Size, Share, Investment Opportunities, Top…

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Safe Haven

Safe Haven

Safe Haven provides advanced FinTech solutions powered by blockchain, and our own patent-pending protocols along with our ‘SafeKey’ HSM cold-storage devices.

More from Medium

A quick glance at NFT’s

An Introduction to Non-Fungible Tokens (NFTs) and How You Can Mint Your Favorite Projects As Told…

Simple Saturday’s: What the heck is a rug pull?

Parameters To Consider For Creating a Crypto Token