Back to Blog
encryptionend-to-end-encryptionat-rest-encryptiondigital-willsecurity

End-to-End Encryption vs At-Rest Encryption for Digital Wills

AK
Abel Kuruvilla
11 min read
Share on X
End-to-End Encryption vs At-Rest Encryption for Digital Wills

End-to-End Encryption vs At-Rest Encryption for Digital Wills

Encryption is the foundational technology that makes digital wills viable. Without it, storing your most sensitive information --- passwords, financial details, legal documents, personal messages --- on any server would be an unacceptable risk. But not all encryption provides the same guarantees, and the difference between end-to-end encryption and at-rest encryption has profound implications for who you must trust with your digital will.

This article defines both encryption models, compares them with a focus on digital estate planning, and explains how Shamir's Secret Sharing adds a threshold protection layer that neither model provides alone.

Defining the Terms

At-Rest Encryption

At-rest encryption protects data while it is stored on disk. The data is encrypted when written to storage and decrypted when read by the application. The encryption key is managed by the server or application that stores the data.

Here is the critical point: the server that stores your data also has access to the decryption key. This means the server operator can, in principle, decrypt and read your data. At-rest encryption protects against physical theft of the storage media (someone stealing the hard drive) and certain types of database breaches (an attacker who copies the raw database files but does not have the application's keys). It does not protect against a compromised server, a rogue administrator, or a legal order compelling the service to decrypt data.

Common examples of at-rest encryption:

  • Database encryption (Transparent Data Encryption in PostgreSQL, SQL Server)
  • Full-disk encryption (LUKS, BitLocker, FileVault)
  • Cloud storage encryption (AWS S3 server-side encryption, Google Cloud default encryption)

End-to-End Encryption (E2E)

End-to-end encryption protects data so that only the intended endpoints --- the sender and the recipient --- can decrypt it. The server that stores or transmits the data cannot decrypt it because it never has access to the decryption key.

In an E2E model, data is encrypted on the client (your device) before it leaves your control. It remains encrypted on the server. It is decrypted only on the recipient's device. The server is a blind relay --- it stores and forwards encrypted data but cannot read it.

Common examples of E2E encryption:

  • Signal messaging protocol
  • WhatsApp messages (using the Signal protocol)
  • ProtonMail
  • Apple iMessage (with Advanced Data Protection enabled)

The Trust Difference

The fundamental difference is who you must trust:

At-Rest EncryptionEnd-to-End Encryption
Trust the server operator?YesNo
Trust the hosting provider?YesNo
Protected from legal compulsion?NoYes
Protected from server breach?PartiallyYes
Protected from rogue admin?NoYes
Key locationServerClient devices only

For daily services like web applications, at-rest encryption is often sufficient because you are actively using the service and can detect misuse. For a digital will, the calculus is different. Your will must remain secure for an indefinite period, potentially years, during which you may not be monitoring the system. The longer the time horizon, the more important it is to minimize the parties you must trust.

Why This Matters for Digital Wills

A digital will has unique security requirements compared to other encrypted data:

Long Storage Duration

Your digital will might be stored for decades before it is needed. Over that time span, companies change ownership, employees turn over, security policies evolve, and legal frameworks shift. At-rest encryption requires you to trust the server operator for the entire storage duration. End-to-end encryption removes that ongoing trust requirement.

Access Happens During a Crisis

When your will is accessed, you are, by definition, not available to authorize or oversee the process. If the server operator has access to the decryption key (at-rest encryption), they could theoretically access your will at any time without your knowledge or consent. With end-to-end encryption, the server operator cannot access the data even if they wanted to.

High-Value Target

A server storing digital wills is an extremely high-value target. It contains concentrated, pre-organized collections of sensitive information: credentials, financial details, legal documents. At-rest encryption provides one layer of defense. End-to-end encryption ensures that even a complete server compromise yields only encrypted data that the attacker cannot decrypt.

A service provider with at-rest encryption can be compelled by law enforcement to decrypt and hand over your data. A service provider with end-to-end encryption can hand over the encrypted data but cannot decrypt it. This distinction matters for digital wills that may contain information relevant to legal proceedings (estate disputes, custody matters, business succession).

The Spectrum in Practice

Real-world digital will implementations fall on a spectrum between pure at-rest and pure end-to-end encryption.

Pure At-Rest (Least Protective)

The server encrypts your will data with a key it controls. The server can decrypt any will at any time. Protection is limited to storage-layer attacks.

Some digital estate planning services operate this way, especially those that offer features requiring server-side processing of your will contents (search, formatting, preview).

Server-Side Encryption with Customer-Managed Keys

The server encrypts your data, but the key is derived from your master password and never stored on the server in plaintext. The server can only decrypt data when you provide your password. This is how most password managers work.

This is better than pure at-rest encryption because the server cannot access your data without your password. However, when you log in and provide your password, the server has temporary access to the decrypted data. A compromised server could capture your password during login.

True End-to-End Encryption

Data is encrypted on your device before it reaches the server. The server never has access to the plaintext or the decryption key. Decryption happens only on authorized client devices.

This provides the strongest protection but creates a challenge for digital wills: if only your devices can decrypt the data, how do your beneficiaries access it after your death?

How BAP Bridges the Gap

Burning Ash Protocol uses a hybrid model that provides strong encryption guarantees while solving the succession access problem.

Encryption Architecture

BAP encrypts will data using AES-256-GCM with per-will Data Encryption Keys (DEKs). The DEK for each will is encrypted by a Master Key that is provided as an environment variable at server startup.

In a self-hosted deployment, you control both the server and the Master Key. No third party has access to either. This provides a trust model equivalent to end-to-end encryption: the only party with access to the decryption keys is you.

The Succession Problem

Pure end-to-end encryption creates a paradox for digital wills. If only you can decrypt the data, and you are dead, the data is permanently inaccessible. Some mechanism must exist to transfer decryption capability to your beneficiaries without giving them (or anyone else) access before the appropriate time.

BAP solves this with Shamir's Secret Sharing. When the Will Transfer Protocol triggers, the DEK is split into N shares using Shamir's algorithm. Each share is distributed to a designated Survivor. A threshold K of those shares is required to reconstruct the DEK and decrypt the will.

This means:

  • Before the switch triggers, no Survivor has any key material
  • After the switch triggers, each Survivor has exactly one share
  • No single Survivor can decrypt the will alone
  • The minimum required coalition of Survivors must cooperate to reconstruct the key
  • The server never sends the DEK directly to anyone

Trust Model Comparison

ScenarioAt-Rest OnlyE2E OnlyBAP (Hybrid + Shamir)
Server breachData exposedData safeData safe (encrypted with DEK, DEK encrypted with Master Key)
Rogue adminData exposedData safeData safe (admin has Master Key, but DEK shares are distributed)
Single beneficiary compromisedN/AN/AData safe (one share is insufficient)
Owner deceasedServer decides accessData permanently lockedThreshold of Survivors reconstruct key
Legal compulsionData can be decryptedCannot complyEncrypted data only; key shares are with Survivors

Shamir's Secret Sharing: The Threshold Layer

Shamir's Secret Sharing deserves detailed explanation because it is the mechanism that makes threshold-based will recovery possible.

How It Works

Shamir's Secret Sharing is a cryptographic algorithm invented by Adi Shamir in 1979. It splits a secret (in BAP's case, the DEK) into N shares such that any K shares can reconstruct the secret, but fewer than K shares reveal no information about the secret whatsoever.

The algorithm works by constructing a random polynomial of degree K-1 where the secret is the constant term. Each share is a point on this polynomial. Given K points, the polynomial can be uniquely reconstructed using Lagrange interpolation, recovering the secret. With fewer than K points, there are infinitely many polynomials that fit the points, and the secret could be any value --- no information is leaked.

Why This Matters for Digital Wills

Shamir's Secret Sharing provides several properties that are uniquely valuable for digital wills:

Perfect secrecy below threshold. Possessing K-1 shares gives an attacker literally zero information about the secret. This is not "hard to crack" --- it is information-theoretically impossible. This is a stronger guarantee than most encryption provides.

Flexible trust distribution. You choose how many shares to create (N) and how many are needed to reconstruct (K). A 2-of-3 split means any two of your three Survivors can access the will. A 3-of-5 split provides higher resilience against a single compromised Survivor. You tailor the threshold to your specific family situation and trust model.

Resilience to lost shares. If N=5 and K=3, up to two Survivors can lose their shares or become unreachable, and the remaining three can still reconstruct the key. This redundancy is critical for a system that may not be activated for years, during which Survivors may change contact information, move, or themselves pass away.

No single point of compromise. Unlike a system where one emergency contact gets the full decryption key, Shamir splitting ensures that compromising any single party (including the server) is insufficient to access the will.

Common Misconceptions

"At-Rest Encryption Is Enough Because I Trust My Server"

Even if you run your own server, at-rest encryption leaves data vulnerable to:

  • Memory dumps if the server is compromised while running
  • Backup files that include the encryption key
  • Key exposure through misconfigured logging or monitoring
  • Physical access to the server (by a hosting provider employee, for instance)

Self-hosting significantly reduces the trust surface compared to a third-party service, but adding per-will keys and threshold recovery on top of at-rest encryption provides defense in depth.

"E2E Encryption Means the Server Operator Cannot Help"

True end-to-end encryption means the server operator cannot decrypt your data. For a digital will, this is actually a problem during the recovery phase. The server needs some mechanism to facilitate key transfer to your beneficiaries without ever possessing the full key itself. Shamir's Secret Sharing enables this: the server distributes shares but never possesses enough shares to reconstruct the key.

"Encryption Is Either Secure or It Is Not"

The real question is not "is this encrypted?" but "who has access to the decryption key, and under what conditions?" At-rest encryption and E2E encryption are both "encrypted," but they make fundamentally different promises about who can access the plaintext. For a digital will, the key management model matters more than the encryption algorithm.

Making Your Decision

When evaluating digital will solutions, ask these questions about the encryption model:

  1. Who holds the decryption key? If the answer is "the server," you are trusting the server operator with your will.

  2. Can the service provider read your will? If yes, at-rest encryption only. If no, some form of E2E or client-side encryption.

  3. How do your beneficiaries get access? Is it a single key handoff, or is there threshold splitting?

  4. What happens if one beneficiary is compromised? With threshold recovery, one compromised share is harmless. Without it, one compromised key means full access.

  5. Can the encryption model survive a server compromise? At-rest encryption alone cannot. E2E or hybrid models with Shamir splitting can.

Conclusion

At-rest encryption protects your digital will from physical theft and certain database breaches but requires you to trust the server operator indefinitely. End-to-end encryption removes server trust but creates a succession access paradox: if only you can decrypt the data, your death makes it permanently inaccessible.

The most robust approach for digital wills combines strong encryption (AES-256-GCM) with threshold key recovery (Shamir's Secret Sharing). This hybrid model provides confidentiality comparable to end-to-end encryption while solving the succession problem through cooperative key reconstruction. Your will remains encrypted and inaccessible until the right number of the right people come together to reconstruct the key --- and not a moment before.

Related Articles