FAQ

These are the questions serious users will ask before they trust the platform.

Can DMS read my encrypted files and notes?

Private vault contents are encrypted before storage and revealed only after a local unlock in the browser. Operational data is still processed so the service can function.

What kind of information can I store?

Text instructions, PDFs, scans, account recovery notes, private letters, document references, and other sensitive materials that remain protected until release.

Can I upload wallet instructions or seed-related guidance?

Yes, but it needs careful handling. Users are best served by pairing it with thoughtful beneficiary guidance, clear offline recovery planning, and proper warnings about sensitivity.

Is DMS a legal will?

No. DMS can securely hold supporting instructions and documents, but it does not replace a legally valid will, trust, or legal advice.

What happens if I miss a check-in?

The release does not begin immediately. Reminder notices are sent first. Only after continued silence do verifiers get involved, and two of three must confirm before beneficiary release can proceed.

Why does the dashboard hide filenames and note summaries?

Because if the app shows plaintext too casually, users will assume admin can see the same thing. A locked-by-default dashboard makes the privacy model visible and understandable.

What if I lose my vault secret or recovery instructions?

If the system is protecting encrypted vault contents, losing that secret may make the contents permanently unreadable. This is why recovery guidance and testing are part of onboarding.

Can verifiers make mistakes?

Yes. No system can eliminate human error. That is one reason to require multiple verifiers, clear role acceptance, and careful test mode review before activation.

Do I need to pay before I can see how DMS works?

No. The path is free test mode first, then paid activation only after the user understands the workflow and is comfortable with it.

Who is DMS best for?

People who hold important information that no one else knows: sensitive instructions, recovery guidance, private letters, business continuity notes, or documents that cannot be casually exposed or permanently lost.