Recovery solutions for the moments that matter

Epoch Cipher helps you stay recoverable when life goes sideways: lost devices, fraud, illness, incapacity, or executor takeover.

We design executor-ready recovery solutions: clear “what to do next” instructions, offline artifacts when needed, and a verification cadence (drills and checklists) so your plan stays usable over time.

Our approach is non-custodial. It is built around client-directed custody and majority-required recovery, so no single person or location becomes a single point of failure.


Reduce single points of failure.
Increase recoverability.

Built for calm operations: clear ownership, controlled access, and recovery steps that a trusted person can execute under stress.

Get on the waitlist

For more information:

Start here

If you have an account you really cannot lose, start with this.

This is a recovery drill (a practice run). It helps you find out if someone else could get you back in if you were not available.

What you will do (15–30 minutes)

  1. Pick one important account (email, bank, phone, password manager).

  2. Write down who would help if you could not do it yourself.

  3. Walk through the steps and see what is missing or unclear.

  4. Leave with a short list of what to fix next.

Safety rules

  • Epoch Cipher will never ask you to send passwords or codes anywhere. Ever.

  • Do not write down passwords, recovery codes, or secret phrases.

  • Do not text, email, or message codes to anyone.

  • If anything feels confusing or unsafe, stop.


What Epoch Cipher is

Epoch Cipher helps people make an “in case of emergency” plan for important accounts. We do not ask for your passwords, and we do not hold your secrets.

If you want help

If you do the practice run and want help making the plan clear and ready, you can request availability here:

For more information:

Recovery drill checklist

This is a recovery drill (a practice run), not an emergency.

After this, you should know:

  • whether someone else could follow your plan

  • what would probably go wrong first


Before you start (2 minutes)

Pick ONE account. Good choices:

  • your main email

  • your bank

  • your phone account (carrier)

  • your password manager

Write down (no passwords):

  • account name

  • why it matters (one sentence)

Choose who would help (1 minute)

Pick one person who could help if you could not do it yourself.
If you do not have someone yet, write “TBD” and keep going.

What does getting back in depend on?

Note what applies:

  • your phone number

  • your email

  • an app that makes login codes

  • a small USB security key

  • backup codes

  • paperwork stored offline


Do the recovery drill (15–30 minutes)

1. What is the first step?

If your helper had to start right now, what would they do first?
Example: “Open the notes binder and follow the steps.”

2. How would your helper prove they are allowed to help?

Example: “Call back number we agreed on.”
Example: “Use attorney paperwork in a controlled meeting.”

3. Are the steps written down somewhere your helper can reach?

If the steps are only in your head, that is the problem.

4. Pick one “what if” and talk through it

Choose one:

  • the phone is lost

  • email is locked

  • the password manager is locked

Ask: “What would we do next?”


Stop if:

  • you feel pushed to share a password or code

  • the only way forward is texting/emailing codes

  • anyone asks you to send passwords or codes “just this once”

  • you would have to guess or rely on memory

Write down the result (no secrets)

  • What worked:

  • What was unclear:

  • What to fix next (1–3 items):

Common fixes:

  • write the steps down in one place

  • make sure the helper can find the steps

  • remove any single thing that would break everything (one phone, one person, one location)

If you want help

If the recovery drill shows real gaps and you want an executor-ready plan, you can request availability here:


Recovery drill guide

Use this if the checklist feels too short and you want more guidance.This is not a second checklist. It explains how to think during the recovery drill, with examples.


The goal (15–30 minutes)

After this, you should be able to answer:

  • Could someone else follow the steps without guessing?

  • What would fail first?

  • What is the next thing to fix?

Pick a simple scenario

Choose one:

  • your phone is lost

  • you cannot get into your email

  • you cannot get into your password manager

Helpful questions to ask (plain language)

1. Where are the instructions?

  • If the steps are only in your head, it will fail.

  • If the steps are in an app you cannot open, it will fail.

2. What does the helper do first?

Examples:

  • “Open the binder and read the first page.”

  • “Call the bank using the saved support number.”

3. How does the helper prove they are allowed to help?

Examples:

  • a pre-agreed call-back number

  • a pre-agreed phrase stored offline

  • attorney paperwork used in a controlled meeting

4. What happens if one thing is missing?

Pick one missing thing (phone, email, key, codes) and ask:

  • What would we do next?

  • Who can do that step?


What “good” looks like

It’s good enough when:

  • the helper can find the steps quickly

  • the helper can explain the next step in plain language

  • you can repeat the recovery drill later without improvising

Common fixes (simple)

  • Put the steps in one place and make them easy to find.

  • Make sure the helper can access the steps without you.

  • Avoid any plan where one lost phone breaks everything.

If you want help

If the recovery drill shows real gaps and you want an executor-ready plan, you can request availability here:

How we work

Start here

Start with a recovery drill (a practice run). It takes about 15–30 minutes and tells you whether your current plan is usable.

What we do

We build and deliver recovery solutions for important accounts and files.

Depending on what you need, that can include physical artifacts (labeled, organized, and kept offline) plus clear instructions and a repeatable verification process.

To make sure the solution is actually usable, we:

  • write and refine “what to do next” steps (clear, short, repeatable)

  • package offline materials when appropriate (labeled and organized)

  • run a recovery drill to confirm the steps work in real life

  • remove obvious single points of failure (one phone, one person, one location)

  • add simple verification habits (checklists, periodic re-checks)

What we will ask for (and what we will not)

We ask for high-level information, like:

  • which account types matter (email, bank, phone, password manager)

  • who should be able to help

  • what tools you already use (for example, a password manager or security key)

We will never ask you to send us passwords, recovery codes, or secret phrases anywhere. Ever.

What you get

Most people leave with a physical recovery solution: labeled, organized materials meant for real emergencies, kept offline.

The kit comes with:

  • clear “what to do next” steps a trusted person can follow

  • a recovery drill checklist you can repeat

In some cases, we start with the drill first, then assemble the physical kit once the steps are clear.

Pricing

Pricing and package details will be published at launch.

Request availability

If you want to talk through fit and scope, request availability here:

FAQ

What does Epoch Cipher do?

Epoch Cipher helps you make a clear “in case of emergency” plan for important accounts, so someone you trust can help you get back in.

Do you need my passwords or secret codes?

No. We do not ask for passwords, recovery codes, or secret phrases.

Do you hold my accounts, money, or crypto?

No. Epoch Cipher is not a custodian. You keep control.

What do you actually deliver?

A physical recovery solution, plus clear instructions and a recovery drill to make sure it’s usable under real-world stress.

What is the first thing I should do?

Run a recovery drill (a practice run) on one important account. It takes about 15–30 minutes.

Is this a password manager?

No. Password managers can be a great part of a plan. We help you make the recovery plan around your tools and your people.

Is this legal advice or estate planning?

No. This is continuity and security planning. If legal language is needed, we can coordinate with your attorney.

What can you not promise?

We cannot promise that every company will cooperate quickly during account recovery. We cannot remove all risk. We can make your plan clearer, more realistic, and easier for a trusted person to follow.

What information do you try not to collect?

We avoid collecting sensitive personal details unless they are strictly required for scheduling, contracting, or billing.

We will never ask you to send us passwords, recovery codes, or secret phrases anywhere. Ever.

Can this be done remotely?

Some work can be done remotely. For higher-assurance setups, in-person work may be preferred.

Request availability

If you want to talk through fit and scope, request availability here:

Privacy Policy

Effective date: 2026-01-26

Plain-language summary

  • We collect limited info to run the website and respond if you contact us.

  • We use Google Analytics to understand basic website traffic, and it may set cookies.

  • If you join our list, Loops stores your email so we can send updates. You can unsubscribe.

  • We do not sell personal information.

  • Please do not send secrets (seed phrases, private keys, master passwords, or 2FA backup codes).


Epoch Cipher, LLC (doing business as “Epoch Cipher”) (“Epoch Cipher,” “we,” “us,” “our”) respects privacy and designs services to minimize data collection and retention. This Privacy Policy explains how we collect, use, and share information when you visit our public website or contact us.

1. Scope

This Privacy Policy applies to:

  • Our public website hosted on Carrd (the “Site”).

  • Communications you send to us through the Site (for example, email links, request forms, or mailing list signups).

It does not apply to third-party websites or services that may be linked from the Site.

2. Information we collect

A. Information you provide

You may choose to provide:

  • Contact information (such as your name and email address).

  • The contents of your message or inquiry.

  • Any information you submit through a mailing list signup (Loops).

Important: Epoch Cipher is intentionally structured so you do not need to share sensitive access details to start a conversation. Please do not send secrets such as seed phrases, private keys, master passwords, or 2FA backup codes.

B. Information collected automatically

When you visit the Site, we and our service providers may automatically collect certain information, including:

  • IP address.

  • Device and browser type.

  • Pages viewed and approximate timestamps.

  • Referring page and exit page.

This information is typically used for basic site operation, performance, and security.

C. Cookies and similar technologies

We use Google Analytics, which typically relies on cookies and similar technologies to collect usage information about visitors and how the Site is used.

Because we currently operate without a cookie banner and are US-based, you should assume Google Analytics cookies may be set when you visit the Site.

3. How we use information

We use information we collect to:

  • Operate and maintain the Site.

  • Understand Site usage and improve content and performance (including through Google Analytics).

  • Respond to inquiries and communicate with you.

  • Manage our mailing list and communications (including through Loops).

  • Protect the Site and our operations (for example, detecting abuse and preventing fraud).

We do not sell personal information.

4. How we share information

We share information only as needed for the purposes described above, including with:

Service providers

We use third-party services to run the Site and our communications, including:

  • Carrd (website hosting and site delivery).

  • Google Analytics (usage measurement and performance analytics).

  • Loops (mailing list and communications).

These providers process information on our behalf to provide their services.

Legal and safety

We may disclose information if required by law, to respond to lawful requests, or to protect the rights, safety, and security of Epoch Cipher and others.

Business transfers

If we are involved in a merger, acquisition, financing, reorganization, or sale of assets, information may be transferred as part of that transaction, subject to appropriate confidentiality protections.

5. Data retention

We retain personal information only as long as reasonably necessary for the purposes described in this policy, unless a longer retention period is required by law or needed for legitimate business purposes (for example, maintaining records of communications).

6. Security

We use reasonable administrative, technical, and physical safeguards designed to protect information. No method of transmission or storage is completely secure, so we cannot guarantee absolute security.

7. Your choices

  • Email communications: If you receive emails from us, you can opt out by using the unsubscribe link in those messages (when present) or by contacting us directly.

  • Analytics: You may be able to limit analytics-related collection through browser settings, cookie controls, or browser add-ons that block analytics scripts.

8. Children’s privacy

The Site is not directed to children, and we do not knowingly collect personal information from children.

9. International visitors

Epoch Cipher is US-based. If you access the Site from outside the United States, your information may be processed in the United States or other locations where our service providers operate.

10. Changes to this policy

We may update this Privacy Policy from time to time. We will update the “Effective date” at the top when changes are posted.

11. Contact

Epoch Cipher, LLC (DBA: Epoch Cipher)

Email: support @epochcipher.com