Frequently asked questions

We’re here to help with any questions about plans, pricing, or what’s included.

Plans & prices

Which plan is best for me?

The right plan depends on your operating model: how you balance control, effort, and recovery assurances.

  • Self-hosted open source is for organizations with dedicated technical resources and operational maturity to manage everything themselves — from infrastructure and encrypted storage to quorum coordination and recovery ceremonies. It gives maximum control at zero cost, but requires significant ongoing effort.
  • On-demand is for individuals, family offices, or small teams who need a safety net for critical data without frequent recoveries. For example, safeguarding high-value keys, estate records, or sensitive archives. You store your own data and pay only if recovery is triggered.
  • Enterprise is for companies that want to reduce operational load and increase confidence in their recovery process without adding headcount. It includes managed storage, scheduled recoveries, guided onboarding, premium support, and predictable timelines — making recovery part of your operations without creating extra work for your team.
  • Dedicated is for organizations with nuanced requirements — such as strict compliance, jurisdictional controls, or complete isolation. It provides a fully private deployment with tailored infrastructure and a recovery policy designed specifically for your organization.
Can I self-host?

Yes. Caution is fully open source, and you can run it yourself at no cost. This option is best for organizations with dedicated technical resources who are willing to handle everything themselves — from setting up infrastructure and managing encrypted storage to coordinating quorum members and running recovery ceremonies. It offers maximum control, but requires significant ongoing effort.

Enterprise and Dedicated plans remove that operational burden by providing managed storage, guaranteed recovery timelines, and support.

What’s included in the On-demand plan?

On-demand lets you store your own encrypted backups and only pay if you need a recovery. It’s the leanest option, with minimal overhead. For teams that want proactive support or guaranteed timelines, Enterprise is a better fit.

Does the On-demand plan include support?

Free support through our open-source Community is available with every plan, including On-demand.

On-demand itself is designed as a self-service tier, but limited paid support can be added if needed. For teams that want ongoing guidance, guaranteed response times, and recovery assistance, Enterprise or Dedicated plans are a better fit.

Talk to our Sales team to explore the right level of support for your needs.

How does the Enterprise plan differ from On-demand?

Enterprise includes 10 TB of managed encrypted storage, geo-replication, two scheduled recoveries per year, and premium support. It’s designed to reduce your operational risk without needing to self-manage.

Why does On-demand recovery cost more?

Each On-demand recovery mobilizes a full recovery ceremony from scratch, with quorum approvals and offline security checks. Enterprise customers benefit from lower recovery costs because their environments are provisioned in advance.

How does pricing work for Dedicated?

Dedicated deployments start at $300K and are tailored for organizations that need fully isolated environments. This includes private infrastructure, custom recovery policies, compliance-driven infrastructure, and expanded storage capacity.

Can I switch plans later?

Yes. You can move between plans as your needs evolve.

Are there any hidden fees?

No. All storage, recovery, and support costs are published. Optional add-ons (like additional storage and priority recoveries) are billed separately. For predictable budgeting, most organizations choose Enterprise or Dedicated.

Security & infrastructure

How does Caution ensure recoveries are secure?

Our recoveries are quorum-based, end-to-end encrypted, and are run fully offline to prevent outside interference. No single person, system, or service can trigger a recovery on their own — multi-party approval is always required. Every step is cryptographically logged and verifiable, so you can audit the process independently.

Learn more about our threat model, design principles, and security architecture in our documentation

What does “open source transparency” mean?

We believe that true security requires transparency and verifiability — you should never have to trust what you can’t see. Open source means our software’s code is public and freely available to inspect, audit, and even run yourself.

Caution is and will always remain fully open source. We don’t sell source code. What we offer commercially is hosting, automation, and support for organizations that want the assurance of managed operations without giving up control.

Who has access to my data?

Only you. Caution never sees plaintext data.

What happens if something happens to Caution?

Only you. Caution never sees plaintext data.

What type of data can I back up and secure with Caution?

Only you. Caution never sees plaintext data.

Data storage

How much data is included in each plan?

Lorem ipsum

What happens if I exceed my 10TB storage limit?

Lorem ipsum

Recovery

How do scheduled recoveries work?

Lorem ipsum

How is a <48h priority recovery different from standard?

Lorem ipsum