Legacy Lockbox
Create a secure backup of your private keys that ensures your crypto will not be lost and will remain accessible to your estate and beneficiaries.

How Legacy Works
01
We use existing keys or seeds
We turn existing private keys or seeds into encrypted key shares that will be distributed to your beneficiaries and custodians. We or our partner custodial trustees can hold some, none, or all the shares depending on your desires. More...
03
We validate recovery requests
Your beneficiaries will have zero-knowledge key shares that are used with a threshold signature scheme to unlock your encrypted keys or seeds.
We validate the authority of your custodians and help manage the process. No single entity is able to access your assets due to the threshold signature requirements. More...
02
You choose recovery conditions
When you crate an account with Lockbox you determine the number of key shares, the threshold required to recover your keys, and who you want involved in that process, such as Commonwealth Lockbox or other custodians. You control the recovery process. More...
04
We help your estate as needed
As you know, between staking, points, pools and protocols, simply holding keys is insufficient to identify where value may exist in a cross-chain world. Our expertise and tools let us identify where your assets exist recover them. More...
What are we doing better?
Other wallets and backup systems make different tradeoffs between recovery and security. Importantly, they are not focused on recovery for your estate, and instead expect you to be around to unlock access to your keys. This can easily result is the loss of your funds and the loss of your legacy for your family.
​
We've look at the entire process and found the best possible path to keep your private keys secure from theft or an inside attack while still making sure you can easily continue your crypto activities. We're not expecting you to suddenly start running all your transactions through multi-signature addresses or use new abstracted wallet types -- you have liquidity positions, degen scores, and pre-airdrop actions tied to your existing addresses. We make this possible while still be sure that you've minimized the chance your crypto assets can be lost.
Existing Keys
The Legacy Lockbox works with any and all of your existing private keys.
​
No need to move assets or exist pools.
No Multi-Sig
Keep using your keys and hardware wallets normally. Legacy Lockbox encryption does not require you to suddenly start using multi-sig wallets for all transactions.
Works with Defi
Keep using defi all the ways you want - Legacy Lockbox doesn't get in the way of your protocol use.
All Tokens & Chains
Legacy Lockbox works will all tokens and chains - no "BTC only" or list of supported tokens.
It's a simple process to get started.
Set up your recovery conditions
When you crate an account with Lockbox you determine the number of key shares you want to create and who you want involved in that process, such as Commonwealth Lockbox or other custodians.
Select your Beneficiaries
Your beneficiaries will be identified with contact information and will be provided with encrypted zero-knowledge key shares. With threshold signatures no single person can access your crypto.
Change at any time
Due to our encryption process, you can change your beneficies at any time. Old keyshares will become useless and new shares will be distributed.
How are private keys stored?
We use several layers of MPC encryption to create the kay used to store your keys or seeds. These zero-knowlege key shares are then distributed among beneficiaries, trustees (and with us with our paid service). We have agreements with law firms that. can provide different levels of trustee and custodial service.
How can they find all my assets?
As you know, between staking, points, pools and protocols, simply holding keys is insufficient to identify where value may exist in a cross-chain world. Our expertise and tools let us identify where your assets exist recover them.
How does my estate claim them?
If you use our service we’ll first verify the identity of your beneficiaries and then combine shares to recover your keys. We won’t participate without your permission or proper legal documentation.
What if you go out of business?
In the event that we cease operations we have an escrow agreement encrypt our shares to your public keys and write them on-chain. This effectively reverts our paid version to the open-source version (see our github for details.)