Killswitch uses zero-knowledge encryption, the same technology trusted by password managers like 1Password and Bitwarden. We literally cannot read your files, even if we wanted to.
We can't read your files. By design.
Your Password
Unlocks Master Key
(in your browser)
Decrypts Your Files
We never see it, store it, or transmit it. Your password stays on your device.
Your master key is encrypted with your password. We store only the encrypted version.
Change your password in milliseconds. No file re-encryption needed, same as 1Password.
Your File
Readable
AES-256-GCM
Encrypted Blob
Random data
Our Servers
Can't decrypt
Files encrypted in your browser before upload
We only ever receive encrypted data
Even if our servers are hacked, files remain encrypted
Same encryption used by banks and governments (AES-256-GCM)
When you share a file, we use a clever system that lets recipients access your files without us ever knowing the decryption key.
You share a file - A unique secure token is generated in your browser
Token encrypts the file key - We only store a hash (fingerprint), never the actual token
Recipient gets a link - The token is in the URL, which we never see
Recipient gets a unique secure link
Token is in the URL, never stored on our servers
You can revoke access anytime
Files stay encrypted throughout the process
Deadman switches automatically transfer your files to beneficiaries if you stop checking in. Here's how we maintain security while enabling this automation.
You Create a Switch
For each beneficiary-file combination, a unique access key is generated in your browser
Keys Are Encrypted and Stored
Access keys are encrypted with our server key (AES-256-GCM) before storage - protected even from database access
You Check In Regularly
As long as you check in, nothing happens. Your files stay encrypted and private.
Miss Your Check-In? Switch Triggers
Access keys are decrypted (server-side) and unique links sent to each beneficiary
Files stay encrypted - We never have your file encryption keys
Per-beneficiary keys - Each person gets their own unique access link
Keys encrypted at rest - Protected by server-side encryption
Test before you trust - Verify everything works with test mode
For automated inheritance to work when you're unavailable, we must store encrypted access keys on our servers. This is the same approach used by 1Password (Emergency Access), Bitwarden (Emergency Contact), and LastPass (Emergency Access). Your files themselves remain zero-knowledge encrypted - we only have the keys to unlock the share links, not your actual file encryption keys.
Zero-knowledge means zero access. Even with full database and server access, our team sees only encrypted blobs.
Cannot read your files
Cannot see your filenames (encrypted in our database)
Cannot access your password
Cannot decrypt your data even if legally compelled
Cannot recover your files if you lose your password (this is a feature, not a bug)
Important: Because we can't access your data, losing your password means losing access to your files forever. We recommend using a password manager.
For the security-minded, here's exactly what we use under the hood.
Password (never stored)
│
└─▶ PBKDF2 derivation (100k iterations)
│
└─▶ Password-Derived Key (PDK)
│
└─▶ Unwraps Master Key (AES-GCM)
│
└─▶ Unwraps File Keys (per-file)
│
└─▶ Decrypts Files (AES-GCM)
We use the same architecture as 1Password, Bitwarden, and ProtonMail:
Each file gets its own unique encryption key:
Additional encryption for metadata stored in our database:
| Feature | Killswitch | Google Drive | Dropbox | iCloud |
|---|---|---|---|---|
| Client-side encryption | Partial | |||
| Zero-knowledge architecture | ||||
| Provider can read files | ||||
| Automatic digital legacy | Limited |
Join thousands of people who trust Killswitch to protect their most important files and ensure their digital legacy reaches the right hands.
🇺🇸 In God We Trust