EMERGENCY ACCESS... LIST OF AUTHORIZED PEOPLE WHEN YOU DIED
That is needed In case of death or a very serious accident (coma, etc..)... an optional feature... only if customer wants
1) User create a list of authorized emails in EMERGENCY ACCESS
2) They may gain access to your account if you die or is injured
3) User defines activation mode (by inactivity time or by authorized email request)
4) User defines time for no response before authorization (minimum 90 days)
5) Emergency access activated when system sends email for emergency user because of lack of activity (and no response from orginal user) or when emergency user tries to log with its own email to a database.
6) Both cases app must warn original user of the violation of the account. Main login, and all passwords cannot be changed or deleted by new user in app.
You tell them and in case of death they try to log using their email. You send messages with the app and email to the original user for 35 days. If no response you grant access for them.
Would really like to see Safe In Cloud implement some "family" features.
1. As a minimum, implement "folders". Then I can put my stuff in my folder, and my wife can put stuff in her folder, and then we can share the database.
I'm surprised this suggestion got so many up votes.
Users don't get a service here, they get a software solution (+updates)! Your data isn't stored in an account on a SafeInCloud's server. Your data is encrypted and stored wherever you specify and the only way to access it is to decrypt it with your master password.
Either get a few basic information about encryption or read the feature list. The latter states:
Zero-Knowledge security means that the application developer or any other person knows nothing about your data..."
AFAIK there are cryptographic measures to achieve something like: 5 people get a part of a key and any 4 of them are able to decrypt the data. But that are much more sophisticated implementations with even more pitfalls than basic encryption applications like SafeInCloud.
Instead better consider an organized overall emergency plan wich includes disclosure of your SafeInCloud master password together with other important data and information.
Greg Hultstrand commented
My vote is no. No need as I don't want to open holes. Plus the system would be the client as Safe-In-Cloud is decentralized and do not run any servers themselves; Which for me was a BIG plus on why I picked this software over others.
SafeInCloud User commented
This in my opinion is an issue, but i dont believe its a safeincloud problem. You choose to restrict and secure your information in such a program so you need to come up with a solution to others having access to your information yourself. I am married and have 3 kids, i do all the electronic stuff in the house and im pretty sure my wife would not have a clue what to do or how safeincloud works. I have printed instructions and recorded the master password on a single piece of paper and have included this with my WILL document which is secure, she is aware of this. If i died, my executor and family will know how to access my passwords and information. So whilst this is not for everyone, and maybe not everyone has a will, it works for me. Others would need to come up with a solution that suits them and their own situation. Suffice to say that you are choosing to secure your data this way so you need to make sure that the relevant people in your circle / world know how to access your info if the need arises. I wouldn't be relying on the program to implement and manage other people having access to your info, you need to manage that yourself.
TV BOX commented
Agreed. This is necessary for relatives to access banking account in extreme scenario. but I doubt I want to grant access for everything to relatives, only those designated "cards" should be visible, i.e. the APP should provide tier 2 password to grant limited access for emergency situation with proper instructions. if the database is sync to the cloud, and the cloud is activated with 2 step authentication, how to grant access to subset of data for designated person without the phone or software "authenticator" is complicated matter... .