Inheriti®
  • 👋Introduction to Inheriti®
  • 💁How it Works
  • ⚒️Requirements
  • 📚Glossary
  • Getting Started
    • 💻Editions
    • 🪪SafeID
    • 🛡️Protection Plans
      • Data Backup Plan
      • Digital Inheritance Plan
    • 🧩Plan Shares
    • 🧑Beneficiaries
    • ⏰Activation Methods
      • Plan Triggers
      • Dead Man Switches (DMS)
    • 🔑SafeKey
      • SafeKey Pro
      • SafeKey Mobile
    • ⛓️Blockchain
      • vechain
      • Ethereum
      • Optimism
    • 🗳️Inheriti® Vault
    • 💳Payment Methods
    • ✨Merging
  • User Guides
    • 🗃️Data Backup Plans
      • Create Backup
      • Merge Backup
    • ⚰️Digital Inheritance Plans
      • Create Inheritance
      • Merge Inheritance
  • Earn Utility Rewards
    • 🔮SHA Safe Nodes
    • 🤝Affiliate Program
  • Technical
    • 🕸️Secure Share Distribution Protocol (SSDP)
    • 🛡️Security Barometer
    • ✅Ownership Verification
    • 🪙SHA Token Utility
  • About
    • Company
    • Patents
    • Trademarks
    • Audits
    • Changelog
      • Inheriti® 2.0
        • Inheriti® 2.2
        • Inheriti® 2.1.2
        • Inheriti® 2.1.1
        • Inheriti® 2.1
      • Inheriti® 1.0
    • Merchandise
Powered by GitBook
On this page
  • What is The Security Barometer?
  • Understanding the Security Barometer
  • Parameters That Influence Security
  • Beneficiaries
  • Recovery Shares
  • Cold Shares
  • Mobile Shares
  • Mobile Shares vs Cold Shares Ratio
  • Merge Threshold
  • Activation Methods
  • Achieving Optimal Security
  1. Technical

Security Barometer

PreviousSecure Share Distribution Protocol (SSDP)NextOwnership Verification

Last updated 8 months ago

What is The Security Barometer?

The Security Barometer is a custom algorithm within Inheriti® that provides real-time feedback on the security level of your protection plan during its creation.

While Inheriti® and the are inherently secure, ensuring that all plans meet a minimum security standard of 80%, the Security Barometer helps you fine-tune your settings to achieve even higher levels of security.

Understanding the Security Barometer

As you configure your protection plan, the Security Barometer evaluates various parameters and reflects the overall security strength. It offers peace of mind by confirming that your plan is not just secure, but optimized for the highest possible protection of your secret data.

Parameters That Influence Security

Beneficiaries

Recovery Shares

Cold Shares

Mobile Shares

Mobile Shares vs Cold Shares Ratio

Merge Threshold

The merge threshold determines how many shares are required to access the data. A higher threshold increases security by necessitating the combination of more shares, making unauthorized access more difficult.

Activation Methods

Achieving Optimal Security

The Security Barometer is designed to help you understand and optimize the security of your protection plan. By paying attention to the parameters that influence security and adjusting them accordingly, you can enhance the safety of your digital assets and ensure that your plan is as secure as possible.

While the baseline security level is always 80%, the Security Barometer encourages you to aim higher, guiding you to create a protection plan that not only meets but exceeds standard security requirements.

Adding more increases the difficulty for unauthorized access, enhancing the security of your plan. The Security Barometer will show a higher score as you involve more trusted individuals.

The number of is crucial. Fewer recovery shares mean that it’s harder to bypass real . This parameter is given a very high importance, as it significantly impacts the security of your plan.

Cold shares are stored on a , which are offline and thus provide an additional layer of protection. The barometer will reflect higher security with a greater number of cold shares.

While using the to store mobile shares offers convenience, it is inherently less secure than cold shares due to the vulnerabilities associated with mobile devices. The Security Barometer will indicate a stronger security rating with fewer mobile shares.

Cold shares, which are stored offline on a device, are generally more secure than mobile shares. A higher ratio of cold shares boosts your security rating, reducing the risk associated with mobile device vulnerabilities.

Adding more introduces additional layers of control and security. The more methods you implement, the more secure your plan becomes, as it increases the difficulty for any unauthorized attempt to access your data.

🛡️
SafeKey Pro
SafeKey Mobile app
SafeKey Pro
beneficiaries
activation methods
SSDP protocol
beneficiaries
recovery shares