{%- include head.html -%}
{%- include header.html -%}

Distrust Disaster Recovery

The only fully open source, technology agnostic disaster recovery system.

While there are solutions offering disaster recovery services, Distrust Disaster Recovery takes a fully transparent and no-compromise approach which is unparalleled in the industry. We challenge you to find someone who has the same level of rigor in eliminating single points of failure and provides visibility into how their systems work.


Documentation Join Waitlist

Features

Air-Gapped

This is meant in the strictest sense, where machines specially provisioned only for managing cryptographic material, which had their radio cards (bluetooth, wifi etc.) removed, and networking capabilities disabled are used in order to always keep the cryptographic material used as the backbone for the system in secure environments.

Agnostic

While most disaster recovery systems only support specific digital assets, our solution can be used for backing up any data. This of course includes digital assets, but can also include other sensitive data.

Open Source

You can verify that the process matches or exceeds the desired threat model you are interested in. Of course, one may use the open source documentation to set up their own system as well, which we encourage.

The Approach

Distrust Disaster Recovery has been designed with the utmost care to eliminate single points of failure to ensure that your backups are inaccessible by any single individual, under any circumstances.

This may seem like a big claim, but all our processes and software are fully open source - so you can verify for yourself.

Most, if not all current commercial backup/disaster recovery systems have many single points of failure and sell a service which is simply not suited for many contexts - especially for backing up digital asset wallets.

Often times, companies need to ensure that they can recovery data while ensuring that no single party can access it independently. This type of necessity is especially pronounced when dealing with contexts such as blockchains, where we often deal with cryptographic material which is able to move large quantities of digital assets.

We specialize in working with high risk clients.

If you protect valuable assets or data, or provide software to others that do, your adversaries will not play fair. We want to help you protect your team and users, and remove single points of failure in your stack.


{%- include footer.html -%}