xWill: Digital Estate Inheritance
XorIDA splits digital assets across designated trustees with a dead man's switch that monitors periodic check-ins, ensuring assets transfer only when the owner is truly unreachable.
The Problem
Digital assets -- cryptocurrency wallets, password vaults, sensitive documents -- are lost forever when their owners die. No secure dead man's switch exists that cannot be triggered prematurely or circumvented by a single bad actor.
An estimated $140 billion in cryptocurrency is permanently inaccessible due to lost keys from deceased holders. Password managers, encrypted drives, and digital accounts die with their owners because no trustworthy inheritance mechanism exists. Writing passwords in a safe deposit box creates a single point of compromise.
Existing digital estate solutions rely on trusted third parties -- lawyers, executors, or cloud services -- who hold complete access credentials. This creates the same single-custodian vulnerability: one compromised executor can steal or destroy the entire digital estate before the intended heirs ever know it existed.
The Old Way
The PRIVATE.ME Solution
xWill splits digital estate assets across designated trustees using XorIDA. A dead man's switch monitors periodic check-ins and triggers asset transfer only after consecutive missed intervals.
The estate owner calls vaultEstate() to split their digital assets into N shares distributed across designated trustees. No individual trustee holds enough shares to reconstruct the assets. The threshold K is configurable -- for example, 3-of-5 trustees must cooperate to access the estate.
The dead man's switch configured via configureSwitch() requires the owner to check in at regular intervals (e.g., every 30 days). After a configurable number of consecutive missed check-ins, the switch triggers and the trustees are notified that they can begin the reconstruction process. False triggers from a single missed check-in are prevented by requiring consecutive misses.
The New Way
How It Works
The xWill lifecycle has three phases: vault creation, periodic check-in monitoring, and triggered transfer. Each phase produces cryptographic receipts for all parties.
Use Cases
Wallet keys and seed phrases split across family trustees. No single heir can access funds prematurely. Threshold cooperation required after confirmed inactivity.
Crypto EstateMaster passwords and recovery keys split across designated successors. Digital life continues seamlessly for dependents after the owner passes.
Digital SuccessionWills, insurance documents, and legal records split across trustees. Lawyers, family members, and executors cooperate for reconstruction.
Estate DocumentsCompany credentials, signing keys, and critical access split across board members. Business continues if key personnel become unavailable.
Key Person RiskIntegration
import { vaultEstate, configureSwitch } from '@private.me/estatevault'; // Vault digital assets with 5 trustees (3-of-5 threshold) const vault = await vaultEstate(assetBundle, trustees, { k: 3, checkInDays: 30 }); // Configure the dead man's switch const dms = await configureSwitch(vault.vaultId, { consecutiveMisses: 3, // trigger after 3 missed check-ins notifyTrustees: true, // alert trustees on trigger gracePeriodDays: 7 // 7-day grace after trigger });
Security Properties
| Property | Mechanism | Guarantee |
|---|---|---|
| Asset Confidentiality | XorIDA K-of-N threshold | Information-theoretic |
| Premature Access Prevention | Dead man's switch + threshold | No early reconstruction |
| False Trigger Prevention | Consecutive miss requirement | Configurable sensitivity |
| Trustee Collusion Resistance | Below-threshold zero-knowledge | No partial information |
| Quantum Resistance | GF(2) operations, no keys | Unconditional security |
Verifiable Data Protection
Every operation in this ACI produces a verifiable audit trail via xProve. HMAC-chained integrity proofs let auditors confirm that data was split, stored, and reconstructed correctly — without accessing the data itself.
Read the xProve white paper →
Ready to deploy xWill?
Talk to Ren, our AI sales engineer, or book a live demo with our team.
Ship Proofs, Not Source
xWill generates cryptographic proofs of correct execution without exposing proprietary algorithms. Verify integrity using zero-knowledge proofs — no source code required.
- Tier 1 HMAC (~0.7KB)
- Tier 2 Commit-Reveal (~0.5KB)
- Tier 3 IT-MAC (~0.3KB)
- Tier 4 KKW ZK (~0.4KB)
Use Cases
Deployment Options
SaaS Recommended
Fully managed infrastructure. Call our REST API, we handle scaling, updates, and operations.
- Zero infrastructure setup
- Automatic updates
- 99.9% uptime SLA
- Enterprise SLA available
SDK Integration
Embed directly in your application. Runs in your codebase with full programmatic control.
npm install @private.me/xwill- TypeScript/JavaScript SDK
- Full source access
- Enterprise support available
On-Premise Upon Request
Enterprise CLI for compliance, air-gap, or data residency requirements.
- Complete data sovereignty
- Air-gap capable deployment
- Custom SLA + dedicated support
- Professional services included
Enterprise On-Premise Deployment
While xWill is primarily delivered as SaaS or SDK, we build dedicated on-premise infrastructure for customers with:
- Regulatory mandates — HIPAA, SOX, FedRAMP, CMMC requiring self-hosted processing
- Air-gapped environments — SCIF, classified networks, offline operations
- Data residency requirements — EU GDPR, China data laws, government mandates
- Custom integration needs — Embed in proprietary platforms, specialized workflows
Includes: Enterprise CLI, Docker/Kubernetes orchestration, RBAC, audit logging, and dedicated support.