
Epoch Cipher helps you stay recoverable when life goes sideways: lost devices, fraud, illness, incapacity, or executor takeover.
We design executor-ready recovery solutions: clear “what to do next” instructions, offline artifacts when needed, and a verification cadence (drills and checklists) so your plan stays usable over time.
Our approach is non-custodial. It is built around client-directed custody and majority-required recovery, so no single person or location becomes a single point of failure.
Built for calm operations: clear ownership, controlled access, and recovery steps that a trusted person can execute under stress.
This is a recovery drill (a practice run). It helps you find out if someone else could get you back in if you were not available.
Pick one important account (email, bank, phone, password manager).
Write down who would help if you could not do it yourself.
Walk through the steps and see what is missing or unclear.
Leave with a short list of what to fix next.
Epoch Cipher will never ask you to send passwords or codes anywhere. Ever.
Do not write down passwords, recovery codes, or secret phrases.
Do not text, email, or message codes to anyone.
If anything feels confusing or unsafe, stop.
Epoch Cipher helps people make an “in case of emergency” plan for important accounts. We do not ask for your passwords, and we do not hold your secrets.
If you do the practice run and want help making the plan clear and ready, you can request availability here:
This is a recovery drill (a practice run), not an emergency.
After this, you should know:
whether someone else could follow your plan
what would probably go wrong first
Pick ONE account. Good choices:
your main email
your bank
your phone account (carrier)
your password manager
Write down (no passwords):
account name
why it matters (one sentence)
Pick one person who could help if you could not do it yourself.
If you do not have someone yet, write “TBD” and keep going.
Note what applies:
your phone number
your email
an app that makes login codes
a small USB security key
backup codes
paperwork stored offline
If your helper had to start right now, what would they do first?
Example: “Open the notes binder and follow the steps.”
Example: “Call back number we agreed on.”
Example: “Use attorney paperwork in a controlled meeting.”
If the steps are only in your head, that is the problem.
Choose one:
the phone is lost
email is locked
the password manager is locked
Ask: “What would we do next?”
you feel pushed to share a password or code
the only way forward is texting/emailing codes
anyone asks you to send passwords or codes “just this once”
you would have to guess or rely on memory
What worked:
What was unclear:
What to fix next (1–3 items):
write the steps down in one place
make sure the helper can find the steps
remove any single thing that would break everything (one phone, one person, one location)
If the recovery drill shows real gaps and you want an executor-ready plan, you can request availability here:
Use this if the checklist feels too short and you want more guidance.This is not a second checklist. It explains how to think during the recovery drill, with examples.
After this, you should be able to answer:
Could someone else follow the steps without guessing?
What would fail first?
What is the next thing to fix?
Choose one:
your phone is lost
you cannot get into your email
you cannot get into your password manager
If the steps are only in your head, it will fail.
If the steps are in an app you cannot open, it will fail.
Examples:
“Open the binder and read the first page.”
“Call the bank using the saved support number.”
Examples:
a pre-agreed call-back number
a pre-agreed phrase stored offline
attorney paperwork used in a controlled meeting
Pick one missing thing (phone, email, key, codes) and ask:
What would we do next?
Who can do that step?
It’s good enough when:
the helper can find the steps quickly
the helper can explain the next step in plain language
you can repeat the recovery drill later without improvising
Put the steps in one place and make them easy to find.
Make sure the helper can access the steps without you.
Avoid any plan where one lost phone breaks everything.
If the recovery drill shows real gaps and you want an executor-ready plan, you can request availability here:
Start with a recovery drill (a practice run). It takes about 15–30 minutes and tells you whether your current plan is usable.
We build and deliver recovery solutions for important accounts and files.
Depending on what you need, that can include physical artifacts (labeled, organized, and kept offline) plus clear instructions and a repeatable verification process.
To make sure the solution is actually usable, we:
write and refine “what to do next” steps (clear, short, repeatable)
package offline materials when appropriate (labeled and organized)
run a recovery drill to confirm the steps work in real life
remove obvious single points of failure (one phone, one person, one location)
add simple verification habits (checklists, periodic re-checks)
We ask for high-level information, like:
which account types matter (email, bank, phone, password manager)
who should be able to help
what tools you already use (for example, a password manager or security key)
We will never ask you to send us passwords, recovery codes, or secret phrases anywhere. Ever.
Most people leave with a physical recovery solution: labeled, organized materials meant for real emergencies, kept offline.
The kit comes with:
clear “what to do next” steps a trusted person can follow
a recovery drill checklist you can repeat
In some cases, we start with the drill first, then assemble the physical kit once the steps are clear.
Pricing and package details will be published at launch.
If you want to talk through fit and scope, request availability here:
Epoch Cipher helps you make a clear “in case of emergency” plan for important accounts, so someone you trust can help you get back in.
No. We do not ask for passwords, recovery codes, or secret phrases.
No. Epoch Cipher is not a custodian. You keep control.
A physical recovery solution, plus clear instructions and a recovery drill to make sure it’s usable under real-world stress.
Run a recovery drill (a practice run) on one important account. It takes about 15–30 minutes.
No. Password managers can be a great part of a plan. We help you make the recovery plan around your tools and your people.
No. This is continuity and security planning. If legal language is needed, we can coordinate with your attorney.
We cannot promise that every company will cooperate quickly during account recovery. We cannot remove all risk. We can make your plan clearer, more realistic, and easier for a trusted person to follow.
We avoid collecting sensitive personal details unless they are strictly required for scheduling, contracting, or billing.
We will never ask you to send us passwords, recovery codes, or secret phrases anywhere. Ever.
Some work can be done remotely. For higher-assurance setups, in-person work may be preferred.
If you want to talk through fit and scope, request availability here:
Effective date: 2026-01-26
We collect limited info to run the website and respond if you contact us.
We use Google Analytics to understand basic website traffic, and it may set cookies.
If you join our list, Loops stores your email so we can send updates. You can unsubscribe.
We do not sell personal information.
Please do not send secrets (seed phrases, private keys, master passwords, or 2FA backup codes).
Epoch Cipher, LLC (doing business as “Epoch Cipher”) (“Epoch Cipher,” “we,” “us,” “our”) respects privacy and designs services to minimize data collection and retention. This Privacy Policy explains how we collect, use, and share information when you visit our public website or contact us.
This Privacy Policy applies to:
Our public website hosted on Carrd (the “Site”).
Communications you send to us through the Site (for example, email links, request forms, or mailing list signups).
It does not apply to third-party websites or services that may be linked from the Site.
A. Information you provide
You may choose to provide:
Contact information (such as your name and email address).
The contents of your message or inquiry.
Any information you submit through a mailing list signup (Loops).
Important: Epoch Cipher is intentionally structured so you do not need to share sensitive access details to start a conversation. Please do not send secrets such as seed phrases, private keys, master passwords, or 2FA backup codes.
B. Information collected automatically
When you visit the Site, we and our service providers may automatically collect certain information, including:
IP address.
Device and browser type.
Pages viewed and approximate timestamps.
Referring page and exit page.
This information is typically used for basic site operation, performance, and security.
C. Cookies and similar technologies
We use Google Analytics, which typically relies on cookies and similar technologies to collect usage information about visitors and how the Site is used.
Because we currently operate without a cookie banner and are US-based, you should assume Google Analytics cookies may be set when you visit the Site.
We use information we collect to:
Operate and maintain the Site.
Understand Site usage and improve content and performance (including through Google Analytics).
Respond to inquiries and communicate with you.
Manage our mailing list and communications (including through Loops).
Protect the Site and our operations (for example, detecting abuse and preventing fraud).
We do not sell personal information.
We share information only as needed for the purposes described above, including with:
Service providers
We use third-party services to run the Site and our communications, including:
Carrd (website hosting and site delivery).
Google Analytics (usage measurement and performance analytics).
Loops (mailing list and communications).
These providers process information on our behalf to provide their services.
Legal and safety
We may disclose information if required by law, to respond to lawful requests, or to protect the rights, safety, and security of Epoch Cipher and others.
Business transfers
If we are involved in a merger, acquisition, financing, reorganization, or sale of assets, information may be transferred as part of that transaction, subject to appropriate confidentiality protections.
We retain personal information only as long as reasonably necessary for the purposes described in this policy, unless a longer retention period is required by law or needed for legitimate business purposes (for example, maintaining records of communications).
We use reasonable administrative, technical, and physical safeguards designed to protect information. No method of transmission or storage is completely secure, so we cannot guarantee absolute security.
Email communications: If you receive emails from us, you can opt out by using the unsubscribe link in those messages (when present) or by contacting us directly.
Analytics: You may be able to limit analytics-related collection through browser settings, cookie controls, or browser add-ons that block analytics scripts.
The Site is not directed to children, and we do not knowingly collect personal information from children.
Epoch Cipher is US-based. If you access the Site from outside the United States, your information may be processed in the United States or other locations where our service providers operate.
We may update this Privacy Policy from time to time. We will update the “Effective date” at the top when changes are posted.
Epoch Cipher, LLC (DBA: Epoch Cipher)
Email: support @epochcipher.com