Lockbox
Split keys into multiple shares. No single point of compromise.
Fully local. Fully offline.
What is Lockbox?
Lockbox uses threshold secret sharing to split the key to your data into multiple independent shares. Only a set minimum number of shares can reconstruct the original key.
No cloud. No central authority. No single point of failure.
How It Works
1. Select data to encrypt
Select any files you want to protect. The files will be encrypted within a Lockbox that can be saved and shared.
2. Split the key into Shares
Choose the number of shares and the threshold required to reconstruct the key.
3. Store Shares Securely
Each share can be stored separately for maximum security. A share is useless on its own.
4. Recover
Combine the required threshold of shares to restore the original key and unlock the Lockbox.
Use Cases

Personal / Family Safeguards
Create shared control over sensitive personal files. For example, two family members much both approve before accessing legal documents, inheritance files, passwords, or private archives. This adds a real-world "two-person rule" to your digital assets.

High-Security Environments
Implement a digital equivalent of the nuclear "two-person system". Require two or more keys before unlocking highly sensitive digital assets. Ideal for defence.

Shared Access Control (2-of-2 or 2-of-3 unlock)
Require multiple keys to unlock sensitive files. For example, two partners must both use their keys before financial records open. No single person can access the data alone. Perfect for shared ownership, co-founders, or joint decision-making environments

Engineering & Research Teams
Secure propietary designs, firmware tools, or simulation data so that they require multiple team leads to unlock. For example, two senior engineers must be present to access sensitive R&D materials. Especially relevant for offline labs or secure facilities.

Crypto / Asset Custody
Store wallet backups or financial records securely, requiring multiple keys to access. Store keys in multiple locations for redundancy and security. Even if one key is compromised, the data remains secure.

