How deadhand Works
The Problem: The Trust Paradox
When you die, your crypto dies with youβunless you've shared your seed phrase. But sharing creates risk:
- Share with family? They might steal it
- Use a lawyer? They don't understand crypto
- Use a service? You're trusting them with everything
This is the Trust Paradox: You need to share access, but sharing access is dangerous.
The Solution: Shamir's Secret Sharing
deadhand uses a cryptographic technique called Shamir's Secret Sharing (SSS), invented by Adi Shamir in 1979.
How SSS Works
Instead of storing your secret as a single piece of data, SSS splits it into multiple "shards" with a threshold scheme:
Secret β Split into N shards β Need K shards to recover (K β€ N)
deadhand uses a 2-of-3 scheme: - 3 shards are created - Any 2 shards can recover the original - 1 shard alone reveals zero information
Mathematical Guarantee
This isn't just "hard to crack"βit's information-theoretically secure:
- With 1 shard, an attacker has infinite possible secrets
- No amount of computing power changes this
- It's not encryption that can be brokenβit's math
The deadhand Architecture
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β YOUR BROWSER β
β βββββββββββββββ βββββββββββββββ βββββββββββββββ β
β β Seed Phrase β -> β Shamir SSS β -> β 3 Shards β β
β β (plaintext) β β (JavaScript)β β A, B, C β β
β βββββββββββββββ βββββββββββββββ βββββββββββββββ β
β β β β
β Never leaves Distributed β
β your browser β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β
βββββββββββββββββΌββββββββββββββββ
β β β
βββββββββββ βββββββββββ βββββββββββ
β Shard A β β Shard B β β Shard C β
β YOU β β HEIR β β SERVER β
βββββββββββ βββββββββββ βββββββββββ
The Dead Man's Switch
Heartbeat System
- Every 30 days: Server sends you an email
- Click the link: Confirms you're alive, resets timer
- Miss 3 checks: Switch triggers after 90 days
What Triggers Release?
Day 0 β Vault activated
Day 30 β Email #1 sent
Day 60 β Email #2 sent (if #1 missed)
Day 90 β Email #3 sent (if #2 missed)
Day 91+ β Shard C emailed to beneficiary
Why 90 Days?
- Short enough to be useful
- Long enough to account for vacation, hospital, etc.
- Can be customized in future versions
Recovery Process
When the switch triggers:
- Beneficiary receives email with Shard C
- They already have Shard B (the printed PDF)
- They visit deadhand's recovery page
- They enter both shards
- Original seed phrase is reconstructed
- They can now access the wallet
Trust Model Summary
| Party | What They Have | Can They Steal? |
|---|---|---|
| You | Shard A | No (need 2 shards) |
| Beneficiary | Shard B | No (need 2 shards) |
| deadhand | Shard C | No (need 2 shards) |
| Hacker (server) | Shard C | No (need 2 shards) |
| You + Anyone | A + B or A + C | β Yes (intended) |
| Beneficiary | B + C (after trigger) | β Yes (intended) |
The only way to recover is with 2 shardsβexactly as designed.