Instructions forSelecting Trustees

Selecting your Trustees is a key step in seing up your PasswordPact Event Vault. These are the individuals you empower to act according to your wishes. Our system is designed with unique safeguards, allowing you to choose trustees based on their ability to respond and fulll their roles, rather than primarily worrying about potential collusion.

Guiding Principles for Selecting Your Trustees

  • Identify Reliable Individuals:
    • Think of people from dierent aspects of your life who are responsible and capable of acting when needed. This could include family members, close friends, or other trusted individuals.
    • The primary consideration should be their ability to understand and perform their designated roles within your Event Vault's predened conditions.
  • Leverage System Safeguards:
    • Our platform's security is not solely dependent on trustee trust. It's built on a multi-layered approach that includes cryptographic isolation, unanimous validation requirements, and the owner's continuous control.
    • You, as the Data Owner, retain an "omnipresent kill switch" – the ability to reset the vault at any time, clearing pending requests and re-securing it, should any concerns arise.
  • Understanding the Collaborative Approach:
    • Access to vault contents typically requires unanimous agreement from your designated Validation Trustees, confirming that a real-world trigger event you defined has occurred. This acts as a critical human firewall.
    • Trustees are notified of Open Vault Requests (OVRs), and the transparency of this process creates a social deterrent against frivolous or malicious attempts. A trustee can simply withhold validation if an OVR is invalid (a "defense by doing nothing").
  • Regarding Professional Advisors:
    • While professional advisors (like lawyers or financial planners) can be valuable referrers who recommend Event Vault, they are generally not ideal for the role of Validation Trustee.
    • This is due to potential workflow bottlenecks, their lack of personal "social circle" knowledge needed for confirming your specific trigger events, and potential fiduciary duty complexities.
  • Review and Update Regularly:
    • Life changes, and so can the suitability of your chosen trustees. Periodically review your selections and the roles assigned to ensure they still align with your wishes and circumstances.

Understanding Trustee Roles & Responsibilities

Event Vault uses Role-Based Access Control (RBAC) as its foundational security layer, allowing for granular denition of roles and policy-driven workows. Trustees can be assigned more than one role, but each active role in your vault setup must have at least one trustee.

  • Validation Trustees (Constituting your "Trust Circle"):
    • Role: These are the gatekeepers of your vault. Their primary responsibility is to independently conrm that the specic real-world trigger event you dened for vault access has actually occurred.
    • Process: When an Open Vault Request (OVR) is made, all Validation Trustees must unanimously approve it before the process to access the vault contents can proceed.
    • Notifications: All parties involved, including other trustees, are informed of OVRs and trigger details, enhancing transparency.
  • File Holder Trustees:
    • Role: These trustees (or the Data Owner themselves) are designated to hold a copy of the encrypted vault contents (the Encrypted Digital Data Set - DDS).
    • Security: The DDS is encrypted and distributed; it is never stored centrally on our main plaorm servers.
    • Access: File Holder Trustees cannot decrypt the vault contents themselves unless they are also designated as Key Holders within a specic access policy. Their role is part of our "digital router" system that decouples data, keys, and metadata
  • Key Holder Trustees:
    • Role: Key Holder Trustees are individuals authorized by your vault's policy to be part of the workow that receives or enables access to the decryption keys aer all conditions, including unanimous Validation Trustee approval, have been met.
    • Security: Decryption keys are generated in a secure enclave and managed by an external Key Management System (AWS KMS). Our plaorm does not host or directly access these keys.
    • Process: Access to keys is governed by the RBAC policies you dene and the successful completion of all required validation steps.

By understanding these roles and principles, you can condently select trustees who will help ensure your digital information is shared securely, conditionally, and exactly when needed, according to your plan.