Ensure Business Continuity
Never worry about losing access with Trusted Circle.
It's like giving your team nuclear launch keys. But instead of launching a nuke, Trusted Circle fully restores access to your encrypted account.
No single point of failure and no shared passwords.
Included with Locke Armory. No credit card required.
The Problem
The hidden risk in your business
Single Point of Failure
When the one person with admin access is unavailable, your entire team loses access to critical credentials.
Costly Downtime
Password resets, vendor calls, and emergency interventions waste hours and create security gaps.
Security vs. Access
Traditional solutions force you to choose: share master passwords or accept lockout scenarios.
The Solution
Introducing Trusted Circle
Distribute recovery capability across your trusted team members using advanced cryptographic secret sharing. No single person holds the keys, but together your circle can restore access.
Shamir's Secret Sharing
Your symmetric key is split into encrypted shards. Any k-of-n shares can reconstruct it, but k-1 shares reveal nothing.
Post-Quantum HPKE
Each shard is encrypted with the recipient's public key using X25519Kyber768 hybrid encryption.
See It In Action
Simple Reliable Recovery
Build your circle
Add trusted team members or external partners. Set your threshold—how many people are needed to approve recovery.
Verify with codes
Out-of-band verification codes prevent automated attacks as people will have to communicate the code separately.
Why Trusted Circle?
Security
Zero knowledge recovery.
Client-Side Encryption
All crypto happens in your browser. We never see your secrets.
Post-Quantum Protection
X25519Kyber768 hybrid encryption for future-proof security.
Shamir's Secret Sharing
Mathematically proven threshold cryptography.
Time-Limited Recovery
Sessions expire after 24 hours. No lingering access.
Out-of-Band Verification
Codes shared directly between members prevent automated attacks.
Resilient to Social Engineering
Out-of-band verification codes prevent automated and impersonation attacks.
Use Cases
Built for common business scenarios
Executive Transitions
When a key administrator leaves unexpectedly, ensure the organization retains access to critical credentials without compromising security.
Emergency Access
A team lead is unreachable. Instead of emergency IT procedures, the remaining team activates Trusted Circle to maintain operations.
Partner Networks
MSPs and IT partners can join client circles, providing business continuity while maintaining clear boundaries and audit trails.
Nonstop Productivity
Built for how effective teams work
Security shouldn't slow you down. We designed Trusted Circle around the way real teams collaborate, share, and recover from the unexpected. Out of band communication makes Trusted Circle extremely resilient to social engineering attacks.
Start a 30 day free trial for Locke ArmoryReady to protect your org?
Trusted Circle is included with Locke Armory along with many other features.
$4/user/month. No minimum seats. Cancel anytime.