Security
Your data
is safe with us
We use a unique encryption model to ensure your data is impenetrable.
We use a unique encryption model to ensure your data is impenetrable.
No we don’t. And that is what makes us unique. Stornest uses an advanced encryption technology called Zero Knowledge Proof (ZKP). This ensures that no government, hacker, or a member of Stornest can access your confidential information.
Here is how it works. When you upload data on our platform the system generates master encryption key. This key is split into three parts: first part of the key stays with Stornest, the second part is stored securely by Oracle Blockchain, and the third part is send to you via email. Make sure that your part of the key is kept in a safe place. Stornest has no access to the other two parts of the key.
If data sharing is triggered, beneficiaries will receive a code via email, which is automatically generated after the two parts of the decryption key (Stornest’s and Oracle’s parts) are put together, to be able to access the data. If they do not act upon the email, we will follow up with an SMS and a phone call to inform them of the data they are supposed to receive. Once the beneficiaries have downloaded all information, your account will be deleted and the account will be closed.
That is right. Stornest and the third-party provider hold part of your key. Hence, neither they nor us cannot access your data.
Anything you upload goes straight to Amazon Web Services and we leverage their high standards for privacy and data security.
Unlike traditional cloud service providers that access your files, our tool does not involve syncing data across platforms or devices, therefore only you are able to access your files.
In addition, every time you use our tool, your data is encrypted at all times using 256-bit Advanced Encryption Standard, the most advanced encryption method.
We like to think of ourselves as your legacy consultants.
When you log in to Stornest you will find a guide for legacy planning and sharing information in a way that eliminates the risk of leaving out any part of your legacy. We will guide you on how to develop your legacy plan while at the same time to ensure that your data is protected.
Moreover, having a vast experience on the topic has inspired us to also launch the Stornest Resource Center where we will share with you articles that will cover all critical legacy planning information. Subscribe to our content to get tons of useful tips from our experts that will help you prepare your legacy plan in detail.