Key Man Out is built on a zero-knowledge security architecture, meaning the server never has access to your encrypted secrets. This document explains how the security model works and what you need to know to keep your assets safe.
Zero-knowledge means that the Key Man Out server cannot decrypt or read your sensitive secrets, even if it wanted to. Your secrets (passwords, API keys, confidential text) and file attachments are encrypted on your device before being sent to the server, and they can only be decrypted by people who have the team's vault key phrase.
What Gets Encrypted:
What Is NOT Encrypted (stored as plaintext for service functionality):
What This Means for You:
The Tradeoff:
The vault key phrase is a password-like secret that encrypts all secrets and file attachments in your team. Every asset's sensitive content in a team shares the same vault key phrase, which means:
When creating a team, you'll be prompted to enter a vault key phrase. Follow these guidelines:
Length:
Complexity:
Examples:
❌ Weak: MyTeamPassword123
✅ Good: Tr0pic@l-F1sh!Sw1m_Deep#2024
✅ Better: correct horse battery staple umbrella fountain keyboard rainbow
Passphrase Method (Recommended):
purple elephant 7 dancing microwave sunset cloudCRITICAL: Your vault key phrase must be stored somewhere safe and accessible. If you lose it, your encrypted secrets are permanently unrecoverable.
Safe Storage Options:
Unsafe Storage Options:
❌ Never Store:
During team creation, you can optionally enter a key phrase reminder:
Examples:
If your key phrase is purple elephant 7 dancing microwave sunset cloud:
❌ Bad Reminder: purple elephant 7 dancing
✅ Good Reminder: 7 random nouns from the zoo incident
If your key phrase is Tr0pic@l-F1sh!Sw1m_Deep#2024:
❌ Bad Reminder: tropical fish 2024
✅ Good Reminder: vacation memory from last summer
All encryption and decryption of secrets happens in your web browser using the Web Crypto API:
Key Man Out uses AES-256-GCM (Advanced Encryption Standard, 256-bit, Galois/Counter Mode):
Technical Details:
Encrypted Data (stored encrypted on server, requires vault key phrase to access):
Unencrypted Data (stored in plain text on server, accessible without unsealing):
Why Not Encrypt Everything with the Vault Key Phrase?
A team is like a physical vault with two states:
When a team is sealed:
When Sealed:
To unseal a team and view secrets:
Security Notes:
For security, the vault automatically reseals after 30 minutes of inactivity:
Why 30 Minutes?
This balances security with usability:
You can reseal the vault at any time:
When to Manually Reseal:
Key rotation allows you to change your team's vault key phrase without losing access to your encrypted secrets. This is essential for maintaining security when:
Key rotation is a multi-step, multi-party process designed to ensure security:
Important: The server never sees either the old or new vault key phrase—only their hashes. All decryption and re-encryption happens in your browser.
For single-owner teams, the rotation proceeds immediately. For teams with multiple owners/admins, the rotation enters the approval phase.
When another admin initiates a rotation:
Security Note: The initiator should share the new vault key phrase through a secure out-of-band channel (in person, encrypted message, password manager share)—never through regular email or chat.
Once all required approvals are received:
Warning: Do not close the browser window during execution. The process cannot be interrupted safely.
The Guardian System controls who can view encrypted secrets:
See Guardian System for full details on roles.
When a Successor requests access:
This ensures:
Every time someone views an encrypted secret:
Custodians receive email notifications including this information, allowing them to:
Note: Access logging only tracks viewing the secret, not:
File attachments are encrypted using the same client-side encryption as secrets:
Security Notes:
Key Man Out supports multiple secure authentication methods:
All communication between your browser and the Key Man Out server uses HTTPS (TLS 1.2+):
All API requests are:
✅ Server Compromise:
✅ Database Breach:
✅ Insider Threats:
✅ Network Eavesdropping:
✅ Unauthorized Access:
❌ Compromised User Device:
❌ Lost Vault Key Phrase:
❌ Weak Vault Key Phrase:
❌ Social Engineering:
❌ Physical Access to Unsealed Session:
❌ Asset Metadata Exposure:
Q: Can Key Man Out recover my vault key phrase if I lose it? A: No. Due to the zero-knowledge architecture, we cannot recover, reset, or decrypt your vault key phrase. If you lose it, your encrypted secrets are permanently lost (though asset metadata remains accessible).
Q: What happens if Key Man Out gets hacked? A: Your encrypted secrets remain encrypted. Without your team vault key phrase, attackers cannot decrypt your secrets. However, they would see asset names, instructions, websites, and guardian assignments (unencrypted metadata).
Q: Can government agencies force Key Man Out to provide my data? A: We can provide encrypted secrets and unencrypted metadata if legally required, but we cannot decrypt your secrets. Only you have the vault key phrase needed for decryption.
Q: How do I change my team vault key phrase? A: Use the Key Rotation feature in Team Settings > Security. This requires approval from all team owners/admins, who must each independently verify the new vault key phrase. The rotation re-encrypts all secrets with the new vault key phrase. See Key Rotation for details.
Q: Is the encryption strong enough? A: Yes. AES-256-GCM is the industry standard used by governments, militaries, and major tech companies. It's approved by NIST and considered unbreakable with current technology.
Q: What if I suspect my vault key phrase was compromised? A: Use the Key Rotation feature to immediately rotate to a new vault key phrase. All team owners/admins must approve the rotation. Also change any credentials stored in potentially compromised assets.
Q: Can I use the same vault key phrase for multiple teams? A: Technically yes, but we don't recommend it. Each team should have a unique vault key phrase to limit the impact of a compromise.
Q: How is the vault key phrase verified when I unseal? A: We store a hash (SHA-256) of your vault key phrase. When you unseal, your browser hashes your input and compares it to the stored hash. The actual vault key phrase is never sent to the server.
Q: Why 30 minutes for auto-reseal? A: This balances security with usability. It's short enough to limit exposure, but long enough to avoid constant re-entry. You can manually reseal earlier if needed.
Q: What's the difference between the team vault key phrase and my login password? A: Your login password (or OAuth, passkey, etc.) authenticates your identity and grants access to the service. The team vault key phrase encrypts the actual secrets. You need both to view secrets.
Q: What exactly is encrypted vs. not encrypted? A: Asset secrets (passwords, API keys, confidential text) and file attachments are encrypted with your vault key phrase. Asset metadata (titles, instructions, website URLs, guardian assignments) is NOT encrypted and is accessible to our systems for service functionality.
Access Request System
Learn how Successors request and gain access to protected assets using standard approval, time-delay, or DNS verification methods in Key Man Out.
Account Settings
Manage your Key Man Out account profile, security settings, authentication methods, notifications, and sessions. Learn about passkeys, 2FA, and account security.