Automatic Inheritance
Release files automatically when you're gone. Trustees verify your status—no lawyers, no probate delays.
Upload important documents, set who gets what, then forget about it. Inheritfy monitors your activity and automatically releases your files to the right people when the time comes.
Upload files to your encrypted vault
Choose who gets what and when
Stay connected through simple check-ins via login, email, or SMS. If you become unavailable, your packages are delivered to the right people automatically.
Automatic delivery handles the rest
One platform for everything that matters. Store documents, schedule messages, prepare for emergencies, and protect credentials—all in one secure place. Your family gets access automatically when they need it.
Release files automatically when you're gone. Trustees verify your status—no lawyers, no probate delays.
Stay connected with simple check-ins. Login, email, or SMS—whatever fits your life. If you stop checking in, trustees are alerted and can verify your status.
Record birthday messages, graduation letters, anniversary surprises. Delivered on schedule, guaranteed—even if you can't be there.
Hospitalized or traveling? Create temporary access links for trusted contacts. They request access, you control the timing. You're always in command.
Store and inherit passwords, API keys, and access instructions. Everything protected with the same encryption as your documents. Your sensitive information stays safe and secure.
Create different packages for different people. Some get financial documents, others get family photos. Lock in specific files or grant access to your entire vault.
A digital inheritance platform must outlive its users. That's why we're bootstrapped, profitable, and free from investor exit pressure.
We chose boring on purpose. PostgreSQL has been rock-solid since 1996. AWS S3 since 2006 with eleven nines of durability. Our costs scale linearly with no surprises. When your files need to arrive decades from now, you want predictable, not cutting-edge.
If something happened tomorrow, would they know where to find everything?
The thought of leaving chaos behind is what got us started. Bank logins scattered across apps. Insurance policies buried in email. Photos locked behind passwords no one else knows. Instructions we kept meaning to write down but never did.
Sure, we could write it all on a piece of paper and leave it in a drawer. But passwords change. Accounts get added. And honestly - we don't want anyone accessing this stuff while we're still here. The whole point is sharing everything, but only when it matters.
The practical stuff - account access, insurance info, instructions for the house. But also the personal things. Letters we never sent. Photos we meant to organize. A video for when they need it most - things no password manager was built for.
You're the one who knows where everything is.
In one afternoon, you don't have to be the only one.
14-day free trial · No credit card required
We offer server-side encryption for people who are comfortable with us managing their keys, and client-side encryption for those who'd rather hold the keys themselves. Either way, all your data is encrypted in transit and at rest using AES-256.
Zero-Knowledge Privacy
Powered by Shamir Secret Sharing
Your files are encrypted in your browser before upload. We use Shamir Secret Sharing to split your master key into 3 shares - giving you privacy, convenience, AND recovery options.
The privacy-first choice. Even if we're hacked, your data stays private. We mathematically cannot read your files.
Perfect for: Financial records, legal documents, sensitive information, cryptocurrency access instructions
Your master key is split into 3 shares - any 2 can unlock your vault
BIP39 mnemonic generates your master key
Browser Share
Stored locally
Enables auto-unlock
Server Share
Held by Inheritfy
Cannot decrypt alone
Recovery Share
Your backup
24-word phrase
2-of-3 Threshold Recovery
| Feature | Server-Side | Client-Side |
|---|---|---|
| Encryption happens | On server | In your browser |
| Who holds keys? | Inheritfy | Split via Shamir |
| Zero-knowledge | ||
| Recovery options | Account recovery | 24-word phrase |
| Auto-unlock | ||
| Best for | Most users | Privacy-conscious |
We designed Inheritfy around one principle: your encryption keys should never transit our servers. Not as a feature, but as a constraint that shaped every architectural decision. The result: we can't read your files. Under subpoena, we can only hand over encrypted data we cannot decrypt. That's not policy; it's math. But this doesn't make us bulletproof. You're trusting our client code to protect keys on your device, and we build that trust by being transparent about how we work.
Crypto seed phrases are different. Most secrets have layers of protection: MFA, fraud detection, account recovery. Seed phrases have none. One exposure means instant, irreversible loss. That's why we believe they belong in offline cold storage, not with us. Use Inheritfy to store instructions for accessing them.
Start with full access to all features. Pick your plan when you're ready.
No credit card required. Cancel anytime.
See what's included at each tier. You'll choose after your trial.
Essential protection
Complete control
Elite security
Guides, deep-dives, and practical advice on protecting what matters.
AWS cost breakdown, grace period math, and why sustainable pricing matters more than "growth at all costs" for a service meant to outlive you.
Blockchain sounds perfect for inheritance: immutable, decentralized, trustless. In practice, those same properties make it a terrible fit for something that needs to work decades from now.
Apple's Legacy Contact feature is a good start, but it only covers your Apple world. Here's what it does, what it doesn't, and why you probably need more.
Got questions? We have answers.
Set up your secure vault in just 5 minutes. Upload important documents, assign recipients, and rest easy knowing your loved ones will have what they need, when they need it.
Setup in 5 minutes • Cancel premium anytime