Overview
Voice-Level Security: A New Dimension of Digital Trust
Expanding the ever-evolving landscape of digital security, Vault12 has enabled Voice-Level Security for the Vault12 Guard app. This innovative feature adds another mechanism to the ways that Vault12 Guard users can authenticate to each other. Now Vault Owners can use personal voice memos during Vault recovery requests. Voice memos can be used in multiple simple but powerful ways for better safety during recovery requests, adding a new layer of protection to your Digital Guardianship.
Simple Voice Authentication: Added Security for Vaults
Incorporating simple voice authentication as an additional security layer ensures that only the Vault Owner can initiate recovery requests. This method verifies identity through unique vocal characteristics.
Benefits:
- Enhances security by including the Vault Owner's voice message for verification
- Adds an extra layer of protection to recovery processes
The Canary Protocol: Your Early Warning System
The Canary Protocol acts as a subtle security measure, embedding a familiar verbal cue into your voice memos for recovery requests. An agreed-upon phrase, known only to you and your Guardian, serves as a covert password. Its absence suggests a compromised request, signalling an unauthorized recovery attempt.
How it Works:
- Record a voice memo with a pre-agreed verbal cue
- Use this cue in all recovery requests or safety checks
- Guardians recognize the cue, ensuring the request's authenticity
Example:
A friendly greeting or inside joke could serve as the Canary, seamlessly integrated into your communication, adding a layer of fun and security.
Emergency Words: Discreet Alerts
Emergency words provide a discreet method to alert Guardians of potential threats. These phrases, understood only by the recipient, can signal a call for specific behavior (e.g., to avoid confirming recovery requests, or to implement an emergency plan).
Key Features:
- Pre-agreed phrases that indicate distress
- Only recognizable by trusted Guardians
- Prevents unauthorized recovery confirmations, and may help signal for assistance
Example:
A subtle phrase within a memo can alert a Guardian to halt the recovery process, protecting you and your Vault contents.
The backbone for Voice-Level Security implementation
Voice memo data is transferred over the secure and decentralized messaging protocol Zax, developed by the Vault12 team as a foundation of the Vault12 Guardian app. This means that in the case of a private Zax relay, your communication and voice memos will be transferred only by your own private network.
Privacy and Ethical Considerations for Voice-Level Security
Vault12 is committed to maintaining the highest standards of privacy and user consent. All voice authentication data is:
- Encrypted end-to-end
- Stored exclusively on user devices
- Never shared with third-party services
- Fully under user control
Summary: Enhancing Security with Voice-Level Authentication
By treating your voice as a unique, dynamic authentication tool, Vault12 is creating a more intuitive, secure, and human-centric approach to safeguarding digital assets. Voice-Level Security, with its innovative use of voice memos and verbal cues, provides a robust, personalized security solution, ensuring your digital assets are protected with an additional layer of trust.
This additive security function complements the existing high-security measures of Vault12 Guard, such as end-to-end threshold encryption and decentralized messaging. By integrating voice authentication, Vault12 enhances the robustness of its security framework, providing users with personalization tools to ensure that only the legitimate Vault Owner will be able to recover assets from the Vault, thus protecting digital assets with an additional layer of confidence.
Table of Contents
- Simple Voice Authentication: Added Security for Vaults
- The Canary Protocol: Your Early Warning System
- Emergency Words: Discreet Alerts
- The backbone for Voice-Level Security implementation
- Privacy and Ethical Considerations for Voice-Level Security
- Summary: Enhancing Security with Voice-Level Authentication