zobiki, the decentralized innovative backup for your wallet keys
The use of digital wallets, and the adoption of crypto currencies is increasing constantly. Safeguarding your assets is becoming a necessity. Despite the need for a backup system for your wallet keys, the existing methods are either clumsy or inherently unsafe. Zobiki connects the latest technologies such as ML/AI for face recognition, and decentralization with steganography, an image manipulation process, to provide a reliable and safe backup system for your wallet keys.
As a fully decentralized storage system, the key is never stored as a whole in a central point, but it is split in two parts. Only when the two parts come together the key is restored. One part is the image belonging to you, the other is a list of points stored on our cloud servers. Neither piece taken apart can lead to the key, but when are merged together they reveal the stored key.
We use an old technology called steganography, to random pick pixels from an image and use those to store some kind of information. However, Instead of writing the values back onto the image, as a classical steganography process would, we just pack the pixels and store them on our server. Because we use AI/ML and live face recognition no account or password are needed to store the info on our servers.
On our server we store a set of pixels we got from your image. We do not have the image as this is only processed in your local browser. Access to these points is through a AI/ML live face recognition and your personal information. So even if someone impersonate you and get access to the pixels, these produce nothing as they do not contain any information about your key.
zobiki puts together three technologies to provide a smooth service to backup and restore your wallet keys or passwords.
AI/ML are used together with personal information hashes to identify uniquely an individual.
Decentralization is used to separate information into a point dataset (the pixels from steganography process) and blueprint media (the image) and store them in two different places.
Steganography is used to capture random pixels from an image and alter them to store the secret key or password.
Checkout how a backup and a recovery processes are easily done. This video shows step by step how to complete the full process in less than 5 minutes.
One single image and one text up to 256 characters. You can store a full mnemonic code or your key in hex format. Great to start with in the crypto world.
€ 12 /year
Need more space? Get the package with 4 storage texts. This is perfect for multiple wallets and keys as you grow in your crypto space.
€ 24 /year
You are a pro and want all the backup flexibility. Pick the unlimited plan for all your needs.
€ 36 /year
You can pick any image as long as the size is bigger than 200x200 pixels. Our system will let you know if the image is the right size. You should avoid single color pictures (i.e. a completely blue or completely black image) and prefer images that have lots of variations in it. We suggest picking an image that you will easily remember in case you need to restore your keys, since that may happen months or even years later.
Since the image does not contain any information, and it is only used together with the points info to restore your key, you can store it anywhere as long as it is a safe place and does not get lost. Do not store it on your local computer as this can break and therefore lose your image. Your cloud photo album, or a cloud service are the best places as they can store thousands of images and you probably already have such service.
Definitely. The image does not contain any information so you can send it around, however remember that some software may resize/compress your image when sent. These processes will remove important information from the original image and therefore cannot be reused to restore your key. Make sure when you send the image the software you use does not alter your image in any form.
In order to be completely decentralized and password less we need a unique identifier together with the AI/ML live face recognition to uniquely identify you. Your personal information is unique and therefore a great identifier for your profile. However we do not use your personal information, nor we get to know what they are, because we convert them to a “hash” (see it in Wikipedia) and we use that “hash” to identify you. For more info check the Q&A “What if I lose access to my email?”
No, we do not store your personal information. Your information are processed only on your browser and we convert it to a “hash” and we use that “hash” to identify you. We then store that “hash” on our server together with your AI/ML live face recognition data to uniquely identify you.
We use your email to send you temporary tokens, and confirmation of storage and payment information. We also do not like BOT and the email gives us a chance to avoid storing unnecessary information on our servers. We will never contact you except for the items described above, temporary tokens, payment and confirmation of storage information.
If you lose access to your email we cannot send you the temporary token to access your AI/ML live face recognition process, therefore you need to manually identify yourself with a full KYC process using your passport or identification document. If your personal information “hash” matches our “hash” then we will change your email in our server and you will receive the temporary token on your new email. This process however has a small cost due to the manual process we incur. Please do not lose access to your email!
Yes you can, however we discourage you to do it because if someone is able to hack your storage area they will have both the pixels points and can get access to your images as well. You will put them in a position to restore your key very easily.
Zobiki approaches the backup and restore service from different points of view. One is about getting rid of passwords. We know it is a pain to remember passwords, and not only you can forget them, but you can also be hacked easily if your passwords are not strong enough. The second is decentralization. When you use any other service like a password manager or similar services, the full key is stored on their server therefore if they get hacked sometimes soon they can decrypt all the info stolen, and find out your key. If our servers get hacked, they will get a bunch of pixels which are kind of useless.
The only thing we ask you is to keep an image in a safe place!
You can get in touch by writing at getintouch@zobiki.com or write a message by using the contact form below.
All fields with an (*) are mandatory.