Ultra-Secure Vault for

All Digital Assets Crypto Seed Phrases  Pass Phrases  Password Files  Passwords

Security beyond military-grade—4-layer quantum-resistant encryption with biometrics and a fortified Trust Ecosystem.

Uncompromised, Patent(s)-Pending Security

My-Legacy.ai, in partnership with Lokblok, delivers a hacker- and quantum-resistant vault powered by advanced cryptographic algorithms and biometric ID verification.

Shamir’s Secrets

Shamir’s Secrets

Shamie’s Secret Sharing is a cryptographic algorithm that splits a secret into multiple shares, requiring a minimum threshold of shares to reconstruct it..
Elliptical-Curve Diffie-Hellman Algorithms Scheme

Elliptical-Curve Diffie-Hellman Algorithms Scheme

Elliptic Curve Diffie-Hellman is a key exchange algorithm that allows two parties to securely derive a shared secret over an in secure.
Multi-party Computation

Multi-party Computation

Multi-party Computation is a cryptographic technique that enables multiple parties to jointly compute a function over their inputs while keeping those inputs private.
Threshold Signature Scheme

Threshold Signature Scheme

Threshold Signature Scheme lets participants jointly use a secret without any one party ever seeing the whole.
Biometric ID Validation

Biometric ID Validation

Biometric ID verification uses unique biological traits to securely authenticate identity and ensure access is granted only to rightful individuals.

Secure Everything—From Seed Phrases to Legal Documents

Seed Phrases

Secure the most critical components of your digital assets—BIP39 seed phrases, passphrases, and private keys—for wallets like MetaMask, Trust Wallet, Ledger, Trezor, Coinbase Wallet, and more. Whether you’re holding ETH, BTC, or altcoins and more.

Password Backups

Safeguard critical credentials across banking (Chase, Wells Fargo), crypto exchanges (Coinbase, Binance), cloud root accounts (AWS, GCP), password managers (LastPass, 1Password), KMS keys, and more.

Sensitive Files

From password manager exports (e.g., LastPass, 1Password), and legal documents (wills, trusts, power of attorney) to cloud root credentials, KMS files, SSH keys, tax records, insurance policies, seed phrase backups, and more.

How it works

01

Setting up the account

Set up your account and appoint a minimum of 3 loved ones as Guardians.

02

Configure your MPC Quorum

After a minimum of three Guardians have accepted the request, set the minimum quorum and finalise the Guardians.

03

Enrolling secrets

Once MPC configuration is completed, enroll the secrets.

04

Set up Inheritance

You can set up an inheritance for each of your vaults.  A simple 5-step to 4-step workflow enables you to designate your trustees, beneficiaries and asset distribution for the vault.

Secure, Automated Inheritance for Your Digital Assets

Your encrypted vaults are securely transferred to your designated beneficiaries through a tamper-proof, inheritance-ready protocol.
With multi-party verification, successor onboarding, and zero-access guarantees, only the designated beneficiaries gain access at the right time—never before, never by us.

Phantom Secrets ™ Technology

Ultra Security redefines digital confidentiality through Phantom SecretsTM — Lokblok's patent-pending system, where no secrets ever exist until you need them. Secrets Vault ensures that only you or your designated beneficiaries can reconstruct the original when needed.

PHANTOM SECRETS EXPLAINED Engineered for uncompromising users, the 4-Tier Zero Trust Security Architecture leverages Phantom Secrets™ to deliver quantum-resistant protection, zero backdoor access, and total user control, setting a new benchmark beyond industry standards.

Most advanced vault on the planet.

My-Legacy.ai and Lokblok.co have partnered to create the most advanced vault, boasting unparalleled security measures that make it virtually unbreakable, ensuring the utmost protection for your valuable assets.

The Lokblok team has worked at the forefront of hardware-based security engineering for more than two decades and offers ‘Security as a Service’ platform to offer the latest in private key generation and management to secure blockchain applications such as digital asset self-custody.

Lokblok’s achievements:

Best-in-class AI Powered ID Validation

MyLegacy partnered with Hyperverge, a global provider of KYC/AML services, operating in over 140 countries. As an ISO27001-certified and GDPR/CCPA-compliant organization, HyperVerge utilizes proprietary technology to deliver exceptional results. Hyperverge’s FaceMatch engine is recognized as best-in-class, achieving top rankings on NIST leaderboards. HyperVerge processed over 750 million identities in the last three years, making them the largest ID verification player globally. 

They love it, you will too!

Build your legacy with My-Legacy.ai: Simplify inheritance planning, secure your future, and leverage AI-driven solutions for efficient estate management. Get a free consultation today!

Take the Next Step: Secure Your Digital Legacy

You've explored the unparalleled security and cutting-edge technology of our MPC-powered Secrets Vault. Now, it’s time to ensure your legacy is protected and future-proof.

Frequently Asked Questions

MPC (Multi-party Computation) secret sharing is a technique that divides a secret input into shares and distributes them among multiple parties (we call them as Recovery Agents). This method is used to protect the input’s privacy and security. Shamir’s secret sharing is a common method used for this purpose. Here, the input is divided into n shares (equal to the number of Recovery Agents), and the owner sets a minimum threshold of shares required to reconstruct the original input.Each share is then given to the Recovery Agent, ensuring that no one party has access to the entire input. When the original input needs to be reconstructed, the shares are combined using polynomial interpolation. At least the minimum threshold of shares is required to reconstruct the original input.

In MPC secret sharing, the owner of the secret divides the input into encrypted shards and distributes them among the Recovery Agents. The owner can then request the shards from the agents, uses cryptographic algorithm to combine them to reconstruct the original input when needed.

In summary, MPC secret sharing allows the owner to divide their input into shards, distribute them among the Recovery Agents, and reconstruct the original input by combining the shards using a cryptographic algorithm.

At My Legacy, we apply additional layers of process to protect and safeguard secrets. To learn more about how we use MPC for secret protection, please visit our website.

Secrets Vault is a self-custody and recovery solution for Secrets and Keys used to access digital assets. The first release is focused on protecting and recovering BIP39 seed phrases for software and hardware crypto wallets. Unlike other advertised personal crypto security solutions, we secure and recover these Secrets WITHOUT taking your Secret and encrypting, splitting, and distributing pieces to your friends and family’s mobile devices to safeguard! Secrets Vault Shielded by Lokblok brings together the vast experience of the Team developing products, systems, and services to protect national level digital Secrets with provably secure cryptography to guarantee “My Key, My Asset”. We leverage a customer’s trusted network of people or devices to create Recovery Agents for any Secret or Key without anyone but YOU, and YOU ALONE, having access to the Secret or Key to access your crypto.

According to an NBC poll, a fifth of all Americans has used crypto and there are over eighty million crypto wallets worldwide. With so many people invested in crypto, it is extremely important to understand how to protect the keys to use these wallets. It is reported that there have been over one hundred high-volume hacks worldwide to date that affect almost all crypto investors. The problem of protecting wallets is so important that the US Federal Government issued a warning letter to the banks in January 2023 advising them about the risks of hacks,

Joint Statement on Crypto-Asset Risks to Banking Organizations (fdic.gov).

It is a fact that crypto is both difficult and cumbersome to store securely! People often leave their wallet keys in the cloud, where it becomes a huge collective target for hackers, or as a picture stored on their computer, or printed on paper and put away. If the Secret is stored in the cloud, you have given access to the Cloud Service Provider who has the keys as well as a trove on online hackers. And if a person is safeguarding it themselves, people are careless and can accidentally lose it or have devices that store it fail.

Lokblok is the security partner providing the patent-pending provably secure key management service to the Crypto Legacy offerings. The Lokblok Team has worked together for over 20 years solving difficult problems to protect keys, digital assets, data at rest, and data in transit for Government, financial, and enterprise customers.

The patent-pending recovery service uses the public data created and stored during the destruction process in combination with a minimum threshold of Recovery Agents defined by the asset owner to help them recover the Secret on the asset owner’s device.

No! Secrets Vault is a non-custodial service and we do not store the seed phrase or any part of the Secret anywhere in the system in any form.

Nowhere. We cryptographically burn the Secrets when the asset owner enrolled it using a combination of the asset owner’s device and public data created with the assistance of the Recovery Agents.

Lokblok’s key management system for Secrets Vault is a non-custodial service that combines the power of proven cryptographic algorithms, protocols, and standards that include Shamir’s Secret Sharing algorithm, Multi-party Computation, AES-256, public key cryptography, Elliptic Curve Diffie Helman (ECDH), to create a revolutionary way to backup and restore Secrets and Keys.

The service also uses remote attestation and KYC and/or LiveID to verify and validate asset owners and Recovery Agents.

DISCLAIMER:  We are not a law firm and we do not provide legal advice. The guidance generated is not a legal advice and a trained attorney should be consulted to make informed decisions.