Q&A

Cold storage is the best way to protect your passwords, recovery phrases, or secret information. Cold storage maintains information offline, establishing a physical barrier between your confidential information and a hacker. Xecret.io takes cold storage to the next level by simultaneously protecting your assets against physical theft, loss, and disaster.

You can store any text string up to 2,000 characters, approximately 10 - 20 wallet seed phrases, in a set of QR codes (Xecrets). This allows for the protection of passwords, private keys, and seed phrases.

Yes, the Xecret.io app operates on and offline on the client side (user's devices). We do not store any confidential information on our servers. View our article on best practices to learn how to use Xecret.io offline, allowing you to use the product in a trustless environment to maximize your privacy.

We randomize your private information down to each bit and store less than the threshold on each QR code. Attackers can't learn anything from a single QR code regardless of their computational resources. Please refer to our white paper for more details on how our technology works.

Increasing the threshold in a set improves security because it increases the difficulty of taking physical possession of the number of QR codes necessary to recover the secret information.

The Xecret.io threshold system provides redundancy against loss, theft, damage, and destruction. If one QR code is not accessible or readable, you can still decrypt your private information with the remaining QR codes in the set.

A copy of our recovery tool has been placed on Github and Arweave. The recovery tool has no dependencies on our servers and functions as a standalone service. You will always be able to retrieve your confidential information stored in your Xecret.io QR codes, regardless of the status of our business.

Xecret.io can be used to store any sensitive data that can be stored in a plain text format of up to 2,000 characters. We are currently focused on crypto seed phrases and private keys at launch; however, we envision many future use cases beyond cryptocurrency.

Here are a few examples of crypto use cases

If the threshold number of QR codes were lost, the secret information would not be recoverable. For example, consider a set of five QR codes with a threshold of three. If three of the five QR codes were lost, the confidential information would not be recoverable.

Go to the certification page and apply to review the code.

arrow-up icon