<p>Data loss, even with great controls sometimes isn't fully prevented.</p>
<h3>2. Submit verifiable recovery request.</h3>
<p>Submit a request to recover the data, which will be checked against the recovery rules.</p>
<h3>3. Your recovery key is returned.</h3>
<p>The key which is held in escrow by Distrust Key Escrow is re-encrypted to a key provided by the client and released from escrow. This is to ensure that we never have access to your data in plaintext, only the key that you used to encrypt it.</p>
<p>Being able to ensure that all of the software that's used for the QKM system is essential. Learn more about why <ahref="todo">here</a></p>
<h3>Full Source Bootstrapped</h3>
<p>Being able to verify the compiler by <ahref="">bootstrapping</a> it in order to ensure it is not capable of injection malicious code at runtime is an essential part of supply chain security.</p>
<h3>Side Channel Attack Resistance</h3>
<p>Attacks that are able to exfiltrate data via non standard channels is an important consideration when handling sensitive cryptographic material.</p>
<h3>Cold Key Management</h3>
<p>Ensuring that the lifecycle of cryptographic material is handled in a fully air-gapped environment helps drastically reduce surface area for attacks.</p>
<p>Distrust Key Escrow has been designed with the utmost care to eliminate single points of failure to ensure that your backups are inaccessible by any single individual, under any circumstances.</p>
<p>This may seem like a big claim, but all our processes and software are fully open source - so you can verify for yourself. If you still don't trust us, that's okay, you can use our blueprint to set up the QKM system youself - and we invite you to do so. You can find the documentation on how QKM works <ahref="https://docs.distrust.co/qkm">here</a></p>
<p>Most, if not all current commercial backup/disaster recovery systems have many single points of failure and sell a service which is simply not suited for many contexts - especially for backing up digital asset wallets. The lack of transparency on how their systems work means that you as the end user can't verify whether their approach to security matches your desired threat model, and you are left with blind trust, rather with transparency.</p>