In an era of data breaches and privacy violations, the most secure system is one where the service provider can't access your data even if they wanted to. That's zero-knowledge encryption—and it's how Key Man Out protects your most sensitive assets.
Your sensitive data (secrets and file attachments) is encrypted on your device—before it ever leaves your computer—using your team's unique vault key phrase. The server never sees your unencrypted secrets, and we never will.
The Key Man Out Promise: We couldn't read your secrets even if compelled by a court order. They simply don't exist in readable form on our servers.
What's Encrypted: Asset secrets (passwords, API keys, confidential text) and file attachments are encrypted with your vault key phrase.
What's Not Encrypted: Asset metadata (titles, instructions, website URLs, guardian assignments) is stored unencrypted to enable browsing and organization without unsealing the vault.
When you create a team, you establish a shared vault key phrase known only to your team members. This key phrase:
This is the foundation of zero-knowledge: we can verify you have the right key without ever knowing what that key is.
Key Man Out uses AES-256-GCM encryption for secrets—the same standard used by governments and militaries worldwide to protect classified information.
Left: Sealed vault with encrypted assets. Right: Unsealed vault after entering key phrase
Your team's vault operates in two states:
Sealed (Default State)
Unsealed (Temporary Access)
This model ensures secrets are exposed only when actively needed—minimizing the window of vulnerability while allowing convenient organization of assets.
Traditional Systems: Hackers who breach the server gain access to all user data.
Key Man Out: Hackers who breach our server gain access to encrypted secrets that are mathematically useless without your vault key phrase. They would see asset metadata (titles, instructions) but your actual secrets remain protected.
Traditional Systems: Companies can read your data, whether for "quality assurance," advertising, or responding to government requests.
Key Man Out: We can't read your secrets. We can't share what we can't see. Your secret content is protected by mathematics, not just policy. While we can see asset metadata for service functionality, your sensitive information remains encrypted and private.
Zero-knowledge encryption means:
LastPass, 1Password, Dashlane: These encrypt locally but decrypt server-side for sync/sharing. The provider can technically access your vault.
Key Man Out: True zero-knowledge for secrets—we never have the ability to decrypt your sensitive content. Period.
Dropbox, Google Drive, OneDrive: Files are encrypted in transit and at rest, but the provider holds the keys. They can (and do) scan your files.
Key Man Out: You hold the only keys to your secrets and file attachments. We see only encrypted blobs for sensitive content.
HashiCorp Vault, AWS Secrets Manager: Powerful but complex. Require dedicated infrastructure and expertise. Still require trust in the provider.
Key Man Out: Enterprise-grade security with SaaS simplicity. Zero-knowledge means zero trust required.
Zero-knowledge encryption provides unparalleled security—but with an important caveat:
If you lose your key phrase, your data is gone forever.
We can't reset it. We can't recover it. We can't decrypt your data. This is by design—it's what makes the system secure.
Best Practices:
Even with strong encryption, periodic key rotation is a security best practice:
Key Man Out implements a secure, multi-party key rotation process:
To prevent unauthorized key changes, Key Man Out requires independent verification:
While a key rotation is in progress:
Learn more about Key Rotation →
sessionStorage (cleared on tab close)Scenario: A disgruntled employee at Key Man Out wants to steal customer data or government agency issues a subpoena.
Traditional System Result:
Key Man Out Result:
Bottom Line: Your secrets are protected by mathematics, not just promises. Even we can't read them—and that's exactly the point.
Features Overview
Discover Key Man Out's comprehensive features for secure business continuity: zero-knowledge encryption, guardian system, intelligent access control, and complete audit trails.
Guardian System
Complete control over who can access what with custodians, gatekeepers, and successors. Learn how Key Man Out's three-tier role hierarchy provides security with business continuity.