{%- include head.html -%}
{%- include header.html -%}

Recovery Policy Wizard

This wizard will assist you in constructing the set of rules, also known as the Recovery Policy, which specifies under which conditions your data can be recovered. The policy has been designed with flexibility in mind in order to accommodate different use-cases and threat models.

Time Based Rules

Time based rules allow specifying during which time period the policy is active. In order to request data recovery, a policy has to be in an active state at the time the request is made to recover data. If a policy is mutable (allowed to be updated), it can also only happen while the policy is in an active state, and is done by creating a new policy which will take place of the old one. The dates are always interpreted in UTC (Coordinated Universal Time), at 12:00AM of the selected date. The two dates which are configurable, from_date and to_date allow for the following configurations:









Remote Recovery via Cryptographic Signatures

This type of recovery makes it possible to recover data remotely by providing cryptographic signatures to show intent of recovery. We support all widely used types of signatures such as OpenPGP, ETH, BTC, etc. (Contact us if you would like us to support other protocols)





Recovery via KYC Validation and Statement of Intent

Recovery via KYC requires that a threshold of authorized persons be KYCd in person by legal representatives of Distrust and confirm their intent to recover data. This process varies based on the jurisdiction it's being conducted in and adds time to the recovery process.





Data Storage

This part of the policy allows you to select wether you would like Distrust to fully back up all your data, or to only hold an encryption key in escrow, in which case you are responsible for redundantly backing up the encrypted data (learn more here)



Additional Configurations




Deadman switches can only be used with "key-escrow" mode, and not "fully managed". If a policy is defined as a deadman switch, the escrow key will be emailed to the designated email addresses or posted on the Distrust website, or both, as preferred.


{%- include footer.html -%}