How does zero knowledge proof works?

Every client gets their own master encryption key which they need to keep safe. The system generates a master key which is split into three parts: first part of the key stays with Stornest, the second part is stored securely by Oracle, and the third part is send to the user via email. Stornest has no access to the other two parts of the key.

If data sharing is triggered, Stornest and the third-party key storing company send their parts of the key to the beneficiary. Your beneficiary is then able to access the data you have assigned for them.

Learn how to plan your legacy with Stornest

How To Plan Your Legacy Properly?

Start Planning Your Legacy

legacy planing