Store encrypted documents, designate survivors, and let Burning Ash Protocol deliver your legacy automatically when the time comes. Mathematically protected. Zero knowledge.
12
Documents
3
Survivors
Active
Status
Process
Simple by design. Secure by default.
Store Documents
Upload documents, passwords, crypto keys, and anything that matters. Every file is encrypted with AES-256-GCM and stored securely.
Designate Survivors
Choose the people who should inherit your digital legacy. Set a liveness check schedule so the system knows when to activate.
Automatic Transfer
If you stop responding to liveness checks, Burning Ash Protocol triggers the Will Transfer Protocol. Survivors receive access through Shamir threshold authentication.
Features
Why Burning Ash Protocol
AES-256-GCM Encryption
AES-256-GCM encryption protects every file you upload. Encryption keys are split via Shamir's algorithm and distributed among your survivors. Not even we can see your data.
Shamir's Secret Sharing
Your will's decryption key is split into N cryptographic fragments. Any K of them can reconstruct the original. No single survivor can access your will alone.
Multi-Channel Notifications
Notify survivors via Email, SMS, WhatsApp, or Telegram. Use platform connectors or bring your own credentials.
Cloud Storage Integration
Connect Google Drive, Dropbox, or S3. Your encrypted files stay in your preferred cloud provider.
Liveness Verification
Configurable check-in intervals with escalation. Miss enough checks and the Will Transfer Protocol activates automatically. You control the schedule and thresholds.
Document Integrity
Optional Ed25519 signing ensures your will documents have not been tampered with after creation.
Self-Hosted Option
Run the entire Burning Ash stack on your own server. Full sovereignty over your data, notifications, and delivery.
Security
Built on cryptographic certainty
Encryption standard
Notification options
Cloud storage
Security checklist
- AES-256-GCM file encryption
- Shamir's Secret Sharing key splitting
- Ed25519 document signing
- BAP cannot access your data
- Per-will Data Encryption Keys (DEKs)
- Master Key envelope encryption
- OTP-based survivor authentication
- Self-hosted deployment option
Defense in depth
Every layer of Burning Ash Protocol is designed around the principle that no single entity -- not even us -- should be able to access your data. Your files are encrypted with AES-256-GCM, keys are split among your survivors, and the system ensures BAP cannot access your data.
Use Cases
Built for real lives. And what comes after.
Families
Store your will documents, important records, and a final letter. Your children receive everything they need -- without lawyers, without confusion.
Business Owners
Share admin credentials, server keys, and business documents with your co-founder or attorney. Automatically, on your terms.
Crypto Holders
Split your seed phrase across trusted survivors using Shamir's algorithm. No single person can steal your funds -- but together, your survivors can recover them.
Solo Travelers
Set a shorter liveness check while abroad. If something happens, your emergency contacts receive access to critical documents and account information.
Were You Named as a Survivor?
If someone you know used Burning Ash Protocol to protect their legacy, you can access the will securely through our transfer portal.
Protect Your Legacy Today
The hardest part is starting. The rest takes ten minutes.
No credit card required