Security
Safeparts removes single points of failure. It does not make storage and distribution decisions for you.
Threat model (what to assume)
Section titled “Threat model (what to assume)”- If an attacker gets k shares, they can reconstruct the secret.
- If an attacker gets fewer than k shares, they learn nothing useful.
- If you lose too many shares (fewer than k remain), recovery is impossible.
Storage rules
Section titled “Storage rules”- Separate failure modes: different people, devices, and locations.
- Avoid co-location: two shares in the same safe is one compromise away from disclosure.
- Avoid centralization: a shared drive holding multiple shares defeats the point.
- Keep a contact/runbook: who holds each share, and what to do if someone is unavailable.
- Practice recovery periodically.
Passphrases (optional)
Section titled “Passphrases (optional)”Safeparts can encrypt the secret before splitting it. With a passphrase, an attacker needs both:
- at least k shares, and
- the passphrase.
Web UI privacy boundary
Section titled “Web UI privacy boundary”The web UI runs split/combine entirely in your browser via WASM (no backend required). Your secret is not uploaded unless you choose to copy/paste it somewhere else or deploy a modified build.
Build output
Section titled “Build output”When deploying the web UI yourself, publish web/dist/.