UnoLock Knowledge Base
Welcome to the UnoLock Knowledge Base. This is the main entry point for understanding how UnoLock works, how to use it, and how its security model is designed.
UnoLock is built around a few core ideas:
- your data lives in a Safe
- access is controlled by registered access keys
- Safe data is client-side encrypted
- messaging and protected API flows use end-to-end encrypted payload protection
- privacy in UnoLock is driven by OPSEC, metadata minimization, and separation of systems
Public Playground
You can explore UnoLock features in the public playground at safe.test.1two.be.
This is a non-production test environment used to test changes before they are promoted to safe.unolock.com. Logging is enabled, and all data is automatically purged every 24 hours.
Do not store sensitive, personal, financial, prohibited, or irreplaceable data there.
For payment testing, use card number 4242 4242 4242 4242 with any future expiry date, any CVC, and any postal code.
Need help or want to report something? Contact support@unolock.com or visit r/UnoLockSupport.
Start Here
- Get Started: create your first Safe and understand the basics
- Features Overview: see the customer-facing feature set
- Security Overview: understand the security model
- Safe Setup Tutorial: step-by-step setup guide
Introduction
This Knowledge Base explains UnoLock from practical use to deeper architecture. It is organized so customers can start with workflows and concepts, while security reviewers and technical users can drill into the underlying model.
What’s Covered?
- Features: Access keys, Spaces, Shared Spaces, Vault Messaging, DPW, LegacyLink, and more.
- Security: Client-side encryption, end-to-end encrypted payload protection, WebAuthn access, post-quantum design, and threat controls.
- How-To Guides: Task-based tutorials for setup, messaging, Spaces, and recovery/inheritance flows.
- Pricing Tiers: Free, Inheritance, Sovereign, and HighRisk.
- Data Self-Governance: The principles behind UnoLock’s control model.
- Company & Legal: Product background, policies, and supporting information.
Continue to Application Overview
Core Features
UnoLock’s feature set is designed around storage, collaboration, security, continuity, and privacy.
All Features
- Local File Encryption: Encrypt data on-device before upload (all tiers). Learn More
- Global Redundancy: Multi-region AWS backups for reliability (all tiers). Learn More
- FIDO2 & Biometric Login: Passwordless authentication (all tiers). Learn More
- Access Keys & Safe Access: Access the same Safe from multiple devices or users through registered access keys (Inheritance, Sovereign, HighRisk tiers). Learn More
- Spaces: Compartmentalized areas inside a Safe with same-Safe access control (Sovereign, HighRisk tiers). Learn More
- Shared Spaces: Collaboration between separate Safes in the same Space (Sovereign, HighRisk tiers). Learn More
- Vault Messaging: Address-based encrypted messaging and Shared Space invites between Safes (Sovereign, HighRisk tiers). Learn More
- Bitcoin Payment: Anonymous payments via Bitcoin (all tiers). Learn More
- Lifetime Safe: Concept for prepaid credits that help prevent Safe expiration after later billing issues. Learn More
- Absolute Anonymity: OPSEC-driven privacy through metadata minimization and system separation (all tiers). Learn More
- Payment Anonymity: Payment processing designed so billing does not become Safe identity (all tiers). Learn More
- End-to-End Encryption: Client-side encrypted storage plus end-to-end protected messaging and API payloads (all tiers). Learn More
- Lockout Guard: Recover access from lost devices (all tiers). Learn More
- Digital Paper Wallet (BTC, ETH, ERC-20): Generate and export cryptocurrency (BTC, ETH, ERC-20) keys (Sovereign, HighRisk tiers). Learn More
- Duress Decoy: Hide selected sensitive Spaces when a safeword PIN is used (Sovereign tier). Learn More
- LifeSafe: Delete selected sensitive Spaces when a safeword PIN is used (HighRisk tier). Learn More
- LegacyLink: One-time succession or recovery path after configured inactivity conditions (Inheritance, Sovereign, HighRisk tiers). Learn More
- Time Lock: Temporarily lock an individual access key for a selected number of hours (all tiers). Learn More
- PIN Code: Randomized keypad thwarts keyloggers (all tiers). Learn More
- Post-Quantum Encryption: Future-proof protection against quantum threats (all tiers). Learn More
- UnoLock Drop: Sender client for delivering messages/files to a Safe through Receive Addresses. Learn More
Security Architecture
UnoLock’s security model is layered. It does not rely on one control or one secret.
Security Highlights
- Client-Side Encryption: Safe data is encrypted before it leaves the client.
- End-to-End Protected Messaging and API Payloads: protected payloads are not reduced to plain HTTPS-only confidentiality.
- WebAuthn Access Keys: Safe access is based on registered authenticators, not reusable passwords.
- Protected PIN Entry: the PIN is a brute-force and deniability control, not the root encryption secret.
- Post-Quantum Cryptography: quantum-resistant protections are built into the broader model.
Data Self-Governance (DSG)
UnoLock’s Data Self-Governance as a Service (DSGaaS) model is about keeping control with the user instead of turning the platform into the ultimate trust anchor.
DSG Principles
- Security & Privacy: client-side protected data and minimized service-side knowledge
- Autonomy & Control: control access with access keys, Spaces, and Shared Spaces
- Continuity & Succession: plan for recovery, inheritance, and high-risk scenarios without abandoning the core security model
How-To Guides
The how-to section is task-oriented. Start there if you want practical steps instead of conceptual overviews.
Popular Tutorials
- Safe Setup Tutorial: Create your first Safe.
- Local File Encryption: Secure files on-device.
- Granting an Access Key Access to Spaces in the Same Safe: Share one Safe correctly.
- Sharing a Space Between Safes: Use Shared Spaces for collaboration.
- Setting Up LegacyLink: Plan for inheritance.
- Receive Addresses: Create addresses and share UnoLock Drop links for anonymous intake.
Pricing Tiers
UnoLock offers four tiers built around different continuity, collaboration, and protection needs.
Tiers
- Free: core Safe storage and protection
- Inheritance: adds succession and same-Safe multi-access-key support
- Sovereign: adds Spaces, Vault Messaging, collaboration, and advanced privacy/security tooling
- HighRisk: adds the strongest coercion-resistance and long-term protection features
Our Company
TechSologic Inc., creators of UnoLock, is committed to privacy-first innovation. Learn about our mission, Beta Program, and community.
Highlights
- Mission: Build tools for digital sovereignty, user protection, and data self-governance.
- Beta Program: Shape UnoLock’s future with early feature access.
- Reddit Community: Engage at r/UnoLock.
Application Overview
UnoLock CybVault is a cloud-based digital Safe platform for sensitive records, secure messaging, private collaboration, digital inheritance, and high-risk protection scenarios.
Why UnoLock?
- Access Keys, Not Passwords: Safe access is controlled by registered passkeys and hardware-backed authenticators.
- Same-Safe Sharing and Shared Spaces: support both shared access inside one Safe and collaboration between separate Safes.
- Client-Side + End-to-End Protection: stored data, messaging, and protected API flows are covered by layered encryption.
- OPSEC-Driven Privacy Model: payment, messaging, metadata, and Safe access are designed to reduce linkability.
Getting Started
Begin your UnoLock journey with these steps:
- Create Your Safe: Start with the Safe Setup Tutorial and understand how Safe creation and access-key registration work.
- Register Access Keys: Use passkeys, hardware security keys, or compatible authenticators for WebAuthn-based Safe access.
- Choose Your Collaboration Model: Use same-Safe access keys when multiple users share one Safe, or Shared Spaces when separate Safes need to collaborate.
- Protect and Organize Your Data: Use client-side encryption, Spaces, Vault Messaging, and continuity features such as LegacyLink or Lockout Guard where appropriate.