Emergency Kit for Your Digital Life

2 min read Original article ↗

They'll know
what to do

A secure vault for your digital life, ensuring your loved ones can access it if they ever need to.

Lineage Hero

Why use Lineage?

We make it simple to ensure your digital life is handled exactly the way you want, with no compromise on security.

Uncompromising Security

Military-grade encryption. Your data is encrypted on your device and locked away forever.

Smart Privacy

Your beneficiaries are only notified when emergency access is triggered. Until then, you are invisible.

Master Key Protocol

A master password that only you and your beneficiary can recover. We never hold the key.

We can't see your data. By design.

Everything is encrypted on your device with AES-256 before it touches our servers. Your master password is strengthened with Argon2id, making brute-force attacks virtually impossible.

01

Encrypted Before Upload

Your credentials, documents, and instructions are encrypted in your browser. We only store ciphertext we cannot decrypt.

02

Password Never Stored

Your master password never leaves your device. We verify you know it without ever seeing it.

03

Emergency Access, Still Private

When your beneficiaries are notified, they receive a secure access code. But to unlock anything, they still need the master password you shared with them, or the hint only they can decipher.

Secure your
legacy.

One payment. No subscriptions. Complete peace of mind for you and your loved ones.

  • Military-grade Encryption
  • 100MB of Documents
  • 3 Designated Beneficiaries
  • Video & Audio Messages
  • Smart Emergency Trigger
  • Priority Support

Common Queries

You set a check-in interval (e.g., 30 days). If you miss a check-in, we send reminders. If you still don't respond, your designated beneficiaries receive their access keys.

No. All encryption happens on your device before upload. We store only encrypted blobs. We literally cannot see your data.

Since we don't store your password, we cannot reset it. However, you can set up a recovery protocol using a trusted contact or a hardware key during onboarding.

Yes, you have full control to add, remove, or modify beneficiaries and their access levels at any time.