more updates
This commit is contained in:
parent
8d80909c0d
commit
3d7cb6f5ed
|
@ -21,8 +21,8 @@
|
|||
</p>
|
||||
<p>
|
||||
Expedited recoveries start at $30,000, and depend on the
|
||||
complexity of the Recovery Rules the client uses. You
|
||||
may contact `sales at distrust.co` for more details.
|
||||
complexity of the [Recovery Rules](/recovery.html) the client uses. You
|
||||
may contact <b>sales@distrust.co</b> for more details.
|
||||
</p>
|
||||
</div>
|
||||
</section>
|
||||
|
|
File diff suppressed because one or more lines are too long
|
@ -13,7 +13,7 @@ During the quarterly ceremony, Distrust will publish a signature of the latest
|
|||
bitcoin block to prove control of the decryption keys.
|
||||
|
||||
If a client requires an expedited recovery, additional fees apply (available
|
||||
on the pricing page (TODO)).
|
||||
on the [pricing page](/pricing.html)).
|
||||
|
||||
## Recovery Policy
|
||||
|
||||
|
@ -31,7 +31,7 @@ At least one of cryptographic signature or kyc verification is always required.
|
|||
One may choose to require both.
|
||||
|
||||
If you are interested in different or custom rules, please reach out to use at
|
||||
sales@distrust.co (TODO make sure we have this email set up / catchall).
|
||||
sales@distrust.co.
|
||||
|
||||
## Time Lock
|
||||
|
||||
|
@ -40,23 +40,24 @@ possible. The data will not be recoverable until the day after the lock date.
|
|||
|
||||
## Cryptographic Signature Verification
|
||||
|
||||
This method supports PGP, BTC, and ETH cryptographic signatures. One may
|
||||
register as many as 32 public keys, and set how many of those keys are required
|
||||
for a valid recovery request, for example, 3 of 7.
|
||||
This method supports PGP cryptographic signatures. One may register as many as
|
||||
32 public keys, and set how many of those keys are required for a valid recovery
|
||||
request, for example, 3 of 7.
|
||||
<!-- TODO: add BTC and ETH when it's supported -->
|
||||
|
||||
## KYC Verification
|
||||
|
||||
KYC Verification is based on verifying both the individuals identity and their
|
||||
intent to recover data.
|
||||
|
||||
- The data is gathered at the beginning of the relationship. The [Distrust Disaster Recovery Wizard](todo) can be used. Distrust will verify your data once it's submitted.
|
||||
|
||||
- The identity of authorized individuals is verified in person by Distrust staff
|
||||
or legal council representatives. They will verify the individual in person
|
||||
using visual verification, ID documentation, and record a video of the
|
||||
individual's intent to recover.
|
||||
|
||||
- The KYC verification is threshold based, so one may list any number of
|
||||
* The data is gathered at the beginning of the relationship.
|
||||
The [Distrust Disaster Recovery Wizard](todo) can be used to aid you in the
|
||||
process. Distrust will verify your data once it's submitted during a video chat.
|
||||
* During recovery, the identity of authorized individuals is verified in person
|
||||
by Distrust staff or legal council representatives. They will verify the
|
||||
individual in person using visual verification, ID documentation, and record a
|
||||
video of the individual's intent to recover which is then cryptographically
|
||||
signed by Distrust.
|
||||
* The KYC verification is threshold based, so one may list any number of
|
||||
individuals, and require any number of individuals to express intent to recover.
|
||||
For example, the total number of individuals may be 7, and 3 of them are
|
||||
required to initialize the recovery process.
|
||||
|
|
Loading…
Reference in New Issue