Bridging the gap between now and then.
The Kintity inheritance protocol ensures your digital legacy is not lost to forgotten passwords or inaccessible hardware.
How legacy flows.
Each step is governed by the cryptographic state of your vault — never by a Kintity administrator.
Step 01
Designate Beneficiaries
Assign specific records to individuals using email or public keys. You can revoke or edit these mappings at any time.
Step 02
Set Release Triggers
Configure inactivity windows or verification requests that determine when the protocol should advance.
Step 03
Verification Cycle
When a trigger is met, Kintity initiates a grace period and attempts contact across multiple channels.
Step 04
Secure Release
Specific wrapped DEKs are released so beneficiaries can unwrap keys and decrypt the mapped records locally.
The Beneficiary Experience
Loved ones are guided through a calm process. No technical jargon. Just a clear path to the records you left for them.
"Your father has shared the Estate & Insurance folder with you."
Personal Letters Archive
Privacy during life. Access after.
Even administrators cannot trigger a release manually. The protocol is governed by cryptography, not people.
No Backdoors
Access is only possible through the mathematical unwrapping of keys. Under pressure, we can only provide encrypted ciphertext.
Zero-Knowledge Beneficiaries
Beneficiaries never see what is inside the vault until protocol release is complete. Their presence is mapped, not their visibility.
Start your legacy plan today.
It takes less than ten minutes to map your first record.