End-to-end encrypted digital wills

Store encrypted documents, designate survivors, and let Burning Ash Protocol deliver your legacy automatically when the time comes. Mathematically protected. Zero knowledge.

baprotocol.com/dashboard

12

Documents

3

Survivors

Active

Status

Encrypted
Encrypted
Encrypted
AES-256 Encrypted
Zero Knowledge
Open Source

Process

Simple by design. Secure by default.

01

Store Documents

Upload documents, passwords, crypto keys, and anything that matters. Every file is encrypted with AES-256-GCM and stored securely.

02

Designate Survivors

Choose the people who should inherit your digital legacy. Set a liveness check schedule so the system knows when to activate.

03

Automatic Transfer

If you stop responding to liveness checks, Burning Ash Protocol triggers the Will Transfer Protocol. Survivors receive access through Shamir threshold authentication.

Features

Why Burning Ash Protocol

AES-256-GCM Encryption

AES-256-GCM encryption protects every file you upload. Encryption keys are split via Shamir's algorithm and distributed among your survivors. Not even we can see your data.

Shamir's Secret Sharing

Your will's decryption key is split into N cryptographic fragments. Any K of them can reconstruct the original. No single survivor can access your will alone.

Multi-Channel Notifications

Notify survivors via Email, SMS, WhatsApp, or Telegram. Use platform connectors or bring your own credentials.

Cloud Storage Integration

Connect Google Drive, Dropbox, or S3. Your encrypted files stay in your preferred cloud provider.

Liveness Verification

Configurable check-in intervals with escalation. Miss enough checks and the Will Transfer Protocol activates automatically. You control the schedule and thresholds.

Document Integrity

Optional Ed25519 signing ensures your will documents have not been tampered with after creation.

Self-Hosted Option

Run the entire Burning Ash stack on your own server. Full sovereignty over your data, notifications, and delivery.

Security

Built on cryptographic certainty

0-bit

Encryption standard

0 channels

Notification options

0 providers

Cloud storage

Security checklist

  • AES-256-GCM file encryption
  • Shamir's Secret Sharing key splitting
  • Ed25519 document signing
  • BAP cannot access your data
  • Per-will Data Encryption Keys (DEKs)
  • Master Key envelope encryption
  • OTP-based survivor authentication
  • Self-hosted deployment option

Defense in depth

Every layer of Burning Ash Protocol is designed around the principle that no single entity -- not even us -- should be able to access your data. Your files are encrypted with AES-256-GCM, keys are split among your survivors, and the system ensures BAP cannot access your data.

Encryption
Key Splitting
Authentication

Use Cases

Built for real lives. And what comes after.

Families

Store your will documents, important records, and a final letter. Your children receive everything they need -- without lawyers, without confusion.

Business Owners

Share admin credentials, server keys, and business documents with your co-founder or attorney. Automatically, on your terms.

Crypto Holders

Split your seed phrase across trusted survivors using Shamir's algorithm. No single person can steal your funds -- but together, your survivors can recover them.

Solo Travelers

Set a shorter liveness check while abroad. If something happens, your emergency contacts receive access to critical documents and account information.

Were You Named as a Survivor?

If someone you know used Burning Ash Protocol to protect their legacy, you can access the will securely through our transfer portal.

Access a Will

Protect Your Legacy Today

The hardest part is starting. The rest takes ten minutes.

Get Started Free

No credit card required