Ensure Business Continuity

Never worry about losing access with Trusted Circle.

It's like giving your team nuclear launch keys. But instead of launching a nuke, Trusted Circle fully restores access to your encrypted account.

No single point of failure and no shared passwords.

Included with Locke Armory. No credit card required.

Trusted Circle - collaborative protection

The Problem

The hidden risk in your business

Single point of failure

Single Point of Failure

When the one person with admin access is unavailable, your entire team loses access to critical credentials.

Costly downtime

Costly Downtime

Password resets, vendor calls, and emergency interventions waste hours and create security gaps.

Security vs access

Security vs. Access

Traditional solutions force you to choose: share master passwords or accept lockout scenarios.

The Solution

Introducing Trusted Circle

Distribute recovery capability across your trusted team members using advanced cryptographic secret sharing. No single person holds the keys, but together your circle can restore access.

Shamir's Secret Sharing

Your symmetric key is split into encrypted shards. Any k-of-n shares can reconstruct it, but k-1 shares reveal nothing.

Post-Quantum HPKE

Each shard is encrypted with the recipient's public key using X25519Kyber768 hybrid encryption.

Trusted Circle illustration

See It In Action

Simple Reliable Recovery

Locke Armory Trusted Circle configuration showing recoverers

Build your circle

Add trusted team members or external partners. Set your threshold—how many people are needed to approve recovery.

Locke Armory Trusted Circle showing approved recovery code

Verify with codes

Out-of-band verification codes prevent automated attacks as people will have to communicate the code separately.

Why Trusted Circle?

Traditional
Trusted Circle
Single point of failure
close
check
Password sharing required
Often
check
Post-quantum encryption
Rarely
check
Self-service recovery
close
check
Works with partners
Complex
check

Security

Zero knowledge recovery.

enhanced_encryption

Client-Side Encryption

All crypto happens in your browser. We never see your secrets.

security

Post-Quantum Protection

X25519Kyber768 hybrid encryption for future-proof security.

hub

Shamir's Secret Sharing

Mathematically proven threshold cryptography.

timer

Time-Limited Recovery

Sessions expire after 24 hours. No lingering access.

verified

Out-of-Band Verification

Codes shared directly between members prevent automated attacks.

shield

Resilient to Social Engineering

Out-of-band verification codes prevent automated and impersonation attacks.

Use Cases

Built for common business scenarios

Executive transitions

Executive Transitions

When a key administrator leaves unexpectedly, ensure the organization retains access to critical credentials without compromising security.

Emergency access

Emergency Access

A team lead is unreachable. Instead of emergency IT procedures, the remaining team activates Trusted Circle to maintain operations.

Partner networks

Partner Networks

MSPs and IT partners can join client circles, providing business continuity while maintaining clear boundaries and audit trails.

Team collaboration

Nonstop Productivity

Built for how effective teams work

Security shouldn't slow you down. We designed Trusted Circle around the way real teams collaborate, share, and recover from the unexpected. Out of band communication makes Trusted Circle extremely resilient to social engineering attacks.

Start a 30 day free trial for Locke Armory arrow_forward

Ready to protect your org?

Trusted Circle is included with Locke Armory along with many other features.

$4/user/month. No minimum seats. Cancel anytime.