Skip to content

LegacyLink Inheritance

Overview

LegacyLink Inheritance is UnoLock's succession-oriented recovery path for a Safe. A user configures it in connection with LockoutGuard, sets a delay, and generates a dormant LegacyLink credential that can be stored or given to a trusted person. If the configured inactivity conditions are later met, that credential can be used to take custody of the Safe, register a new access key, and continue from UnoLock's normal access-key model. It is best understood as a one-time succession or recovery path, not as a permanent second login method.

How It Works

  • Configured from LockoutGuard: LegacyLink is set up through the LockoutGuard area and depends on that inactivity-based continuity model.
  • Delayed Activation: The user chooses a delay that applies after LockoutGuard has been triggered.
  • Dormant Credential: Setup generates a LegacyLink credential, including an access ID and passphrase, which stays dormant until the configured conditions are met.
  • Stored Outside Daily Access: That credential can be printed, saved, or handed to a trusted person for future use if succession or recovery becomes necessary.
  • One-Time Recovery or Succession Flow: When the conditions are met, the LegacyLink credential is used to begin recovery of the Safe.
  • New Access Key Required: The recovering person must register a new access key and set a new PIN before continuing normal Safe access.
  • Temporary Path Is Removed After Use: Once LegacyLink has been used, the old dormant credential is no longer the ongoing access method. If future succession coverage is still wanted, it should be configured again.

Security Implications

  • No Immediate Secondary Access: LegacyLink does not create a standing second login path for everyday use.
  • Bound to Inactivity Conditions: The dormant credential is intended to become useful only when the configured inactivity path has been triggered.
  • One-Time Transition: After the credential is used, access is moved back into UnoLock's normal access-key model with a newly registered key.
  • Zero-Knowledge Model Remains: LegacyLink fits within UnoLock's client-side and zero-knowledge security model rather than bypassing it.

Use Cases

  • Family Succession Planning: A user can prepare a trusted person to recover the Safe if the owner is gone or permanently unable to access it.
  • Emergency Continuity: Important records can remain recoverable after prolonged inactivity without turning LegacyLink into a normal everyday login path.
  • Single-Safe Handover: LegacyLink can support a planned transfer of custody for the Safe itself rather than day-to-day multi-user collaboration.

Why It Matters

LegacyLink addresses a difficult continuity problem: how to make a Safe recoverable by a successor after prolonged inactivity without weakening UnoLock into a permanent alternative-login system. It provides a bounded succession path and then returns the Safe to the standard access-key model.

FAQs

Does LegacyLink give someone a permanent second way into my Safe?

No. LegacyLink is a one-time succession or recovery path, not a permanent parallel login method.

What do I store during LegacyLink setup?

LegacyLink setup generates a dormant credential that includes an access ID and passphrase, along with a QR code representation for storage or transfer.

What happens when LegacyLink is used?

The recovering person uses the LegacyLink credential to begin the recovery flow, then registers a new access key and sets a new PIN for ongoing use.

What happens after the Safe has been recovered through LegacyLink?

The temporary LegacyLink path is no longer the ongoing access method. If continued succession coverage is needed, it should be configured again.

Compliance & Privacy Regulations

  • Privacy-Preserving Operation: LegacyLink is designed to support succession and recovery without changing UnoLock's underlying zero-knowledge privacy model.

Integration with Other Features

  • LockoutGuard: LegacyLink is configured through the LockoutGuard flow and depends on its inactivity-triggered continuity model.
  • Access Keys: After LegacyLink recovery, the Safe returns to the standard access-key model by registering a new key.