Security Architecture

How Legyra protects your data with military-grade encryption and zero-knowledge privacy.

Zero-Knowledge Privacy

We know nothing. Literally.

Most cloud services hold the keys to your data. We don't. Your data is encrypted on your device using a key derived from your PIN, which is never sent to our servers. This means even if a government subpoenaed us, or a hacker breached our servers, your data would remain unreadable useless gibberish. Only you and your designated beneficiaries hold the keys.

Your Device

Data encrypted here

Our Servers

Encrypted blob storage

Encrypted Data (What we see)

7f4a9c2e1b8d6f3a5c7e9b4d2f6a8c1e3b5d7f9a2c4e6b8d1f3a5c7e9b2d4f6a8c
3e5b7d9f1a3c5e7b9d2f4a6c8e1b3d5f7a9c2e4b6d8f1a3c5e7b9d2f4a6c8e1b
9b2d4f6a8c1e3b5d7f9a2c4e6b8d1f3a5c7e9b2d4f6a8c1e3b5d7f9a2c4e6b8d

Device-Bound Security

Your phone is your key.

Device Key

A unique cryptographic key generated on your device

User PIN

A code only you know, never stored anywhere

We combine a key stored in your phone's secure hardware with your PIN to create the master encryption key. This means an attacker would need to physically steal your unlocked phone AND know your PIN to access your vault. Remote attacks are mathematically impossible.

Duress Mode

Protection when you're forced to unlock.

If someone forces you to open the app (e.g., at a checkpoint or in a hostage situation), you can enter a special "Duress PIN". This unlocks a completely functional fake vault with decoy data. Meanwhile, the app silently notifies your trusted contacts that you are in danger.

Real PIN: Unlocks your actual digital legacy.

Decoy PIN: Opens fake vault + Alerts contacts.

Layers of Defense

Comprehensive security at every level.

1

AES-256 Encryption (Military Grade)

2

PBKDF2 Key Derivation (Brute-force Resistant)

3

SSL/TLS Transit Encryption

4

Biometric Authentication Support

5

Regular Third-Party Security Audits

What We CANNOT Do

Cannot

  • See your passwords or files
  • Reset your PIN if you forget it
  • Sell your data to advertisers
  • Hand over readable data to governments

Can Do

  • Ensure your encrypted data is available
  • Execute your legacy transfer protocols
  • Protect your privacy at all costs