Icon back  Back to list

How are my notes in LegacyApp passed to my Beneficiary?

Let's assume you are a frequent user of LegacyApp, organising all your important information on the app for yourself and your loved ones. Whenever the app asks you to confirm if you are OK, you do so. But you ask yourself:

What if something happens to me? How will my notes be passed to my Beneficiary?

Depending on whether you use the Trusted Friends function, one of two scenarios will occur:

Scenario 1: You do not use the optional and free Trusted Friends function in LegacyApp

If you do not use the Trusted Friends function, the Secure Access Procedure will start right after you miss the second “Is everything OK?” notification. Go to the "Secure Access Procedure" section below to read more.

Scenario 2: You use the Trusted Friends function

In this situation, LegacyApp will first automatically send questions (via email and/or SMS – depending on the preferences each Trusted Friend has set) with a simple question: "Is [Your Name] okay?"

Your Trusted Friends will only be able to respond YES or NO to the question. When at least one person responds NO, the Secure Access Procedure to your data will begin. Go to the "Secure Access Procedure" section below to read more.

Note! If the Trusted Friends do not respond to the question we sent them, within one month LegacyApp will send an email to your Beneficiary. Our email will inform them that you have been using LegacyApp and have prepared important information for them, but access to it is blocked due to the lack of response from the Trusted Friends.

We will suggest that the Beneficiary uses social media to ask if any mutual acquaintances have received notifications from LegacyApp, and to contact people who they think were close to you and who you may have entrusted with this role.

Please note that for the confidentiality and security of your data, LegacyApp will never provide the Beneficiary with a specific list of your Trusted Friends.

Therefore, it is important to choose your Trusted Friends carefully and ask them to add notify@app.legacyapp.rip to their safe senders list in their mailbox and provide their phone numbers for extra security.

 

Secure Access Procedure

Imagine that John Smith (e.g. using his email john@email.com) was gathering notes in LegacyApp and set up his wife, Anna Smith, as his Beneficiary. Therefore, in LegacyApp, he would enter the email that his wife uses most frequently (e.g. anna.smith@email.com) in the Beneficiary field. He also used the Trusted Friends function.

John did not inform Anna that he was using LegacyApp. When creating backups in LegacyApp, he created an encryption key and provided the following hint for Anna:
“The jeweler where I bought your engagement ring + the name of your first cat + @ (symbol). All words capitalized.”
He knew Anna would be able to guess the encryption key based on the hint.

John rides his bike often. During one of his rides, he falls so badly that he goes into a coma. His smartphone, which he used and which had LegacyApp installed on it, was also damaged. Therefore, he stopped responding to notifications in the app and via email.

In this situation, the Secure Access Procedure automatically started on the account registered to john@email.com.

Step 1: LegacyApp sent emails and SMS messages to the Trusted Friends as indicated by John. John’s friend was the first to respond “NO” to the question “Is John OK?”

Step 2: LegacyApp sent an email to anna.smith@email.com entitled “Secure access to information in LegacyApp.”

From LegacyApp's email, Anna learns that user john@email.com had been gathering notes for her in the app, and now Anna has the ability to access these notes. In order to do so, Anna is asked to install LegacyApp and log in using the email address where she received the notification. The system automatically detected that John had set Anna as his Beneficiary.

Step 3: When Anna logged into LegacyApp with the above credentials, she saw the hint for the Encryption Key created by John:
“The jeweler where I bought your engagement ring + the name of your first cat + @ (symbol). All words capitalized.”
She easily guessed the Encryption Key: “TiffanySonia@”

Step 4: After entering the correct Encryption Key when requested, everything worked automatically: the app decrypted the location of John’s backup file on his personal cloud account, downloaded it, and decrypted the notes locally – allowing Anna to browse them.

Thanks to accessing John’s notes, Anna learned a lot of valuable information necessary for her daily life: details about bank accounts and recurring payments that John had been handling.

She also found out that John had joined a group accident insurance policy at work – something he had forgotten to tell her. Thanks to this, Anna was able to submit a compensation claim.

Anna also discovered notes about cryptocurrencies that John had secretly purchased – which proved to be particularly valuable during that difficult time.