100% Client-Side - Your Secret Never Leaves Your Browser

Secret Splitter

Split any secret into multiple shares using Shamir's Secret Sharing. Distribute shares to trusted parties - only the required threshold can reconstruct your secret.

0 / 10,000 characters

3
5
3 of 5 shares required to reconstruct

Any 3 shareholders can recover the secret. 3 shares can be lost without losing access.

How Shamir's Secret Sharing Works

A cryptographic technique invented by Adi Shamir in 1979 that allows you to split a secret into multiple parts, where only a threshold number of parts can reconstruct the original.

Split Your Secret

Your secret is mathematically divided into N shares. Each share by itself reveals nothing about the original secret.

Set a Threshold

Choose how many shares (K) are needed to reconstruct. With K-of-N sharing, any K shares can recover the secret.

Distributed Security

No single person or location has enough information to access your secret. It requires collaboration.

Common Use Cases

Cryptocurrency Seed Phrases
Split your 12/24 word recovery phrase among family members
Master Passwords
Distribute your password manager master key
Encryption Keys
Secure backup keys for encrypted files or drives
Business Secrets
Share critical credentials among trusted partners
Estate Planning
Ensure loved ones can access important information
API Keys & Tokens
Protect production credentials from single points of failure

Your Privacy is Protected

  • 100% client-side processing - your secret never leaves your browser
  • No data is sent to any server - works completely offline
  • No cookies, no tracking, no analytics on this tool
  • Open implementation - verify the code yourself

Want Automated Secret Sharing?

Inheritfy uses Shamir's Secret Sharing to automatically protect your digital legacy. Set up trustees, define policies, and ensure your loved ones can access what matters.