How might an individual use the premium features of FrostByte?
An individual will have many different secret data credentials and documents. Examples of these might include website login details (low value credentials), sensitive documents and photos (medium value data), banking details, wills, property deeds (high value data) and cryptocurrency private keys and/or seed phrases (very high value data).
Individuals may wish to organize their data by their value. For example, a user may wish to create an encrypted data vault for their low value login credentials for websites such as Netflix, Amazon, etc.. For this type of data vault, the user may have themselves, their spouse and their children as the Keyholders, and configure the app so that any one of the Keyholders can unlock this encrypted data vault.
Users could create one or more encrypted data vaults for medium value data, and create one of more Vault Keys for those vaults where, for example, out of a total of say five Keyholders, two Keyholders are required to come together to unlock such vaults.
Users could also create one or more encrypted data vaults for high and ultra high value data, and create one of more Vault Keys for those vaults where, for example, out of a total of say nine Keyholders, five Keyholders are required to come together to unlock such vaults.
Users have full flexibility to determine their own m of n Keyholder security schema for their encrypted data vaults.
If something unfortunate ever happens to the individual (e.g., death or incapacity), users will have established systems to allow their loved ones to access their valuable data.
In the case of death, it is even possible for example for a user to create a separate vault containing their last will and testament, and for the user’s spouse and attorney (and/or other trusted individuals) to come together to unlock that vault and access the user’s will.
Property documents, sensitive images and other such assets can also be stored in encrypted vaults.
Users have full flexibility on how their organize, secure and share access to their secret data.