Empresa
Anastasis SARL was created to offer a usable key backup solution for privacy-enhancing technologies, drawing contributors from open-source communities which, together with experts from the Bern University of Applied Sciences, produced an innovative protocol and reference implementation.
Our goal is to offer key backup and recovery for a broad range of applications, combining both key management as a service as well as support for integration. Anastasis has already caught the interest of additional Free Software privacy projects such as GNU Taler, the Re:claimID identity management system and the NymTech cryptocurrency.
Users of electronic wallets need a way to backup their secret keys. Anastasis enables them to split up key data, encrypt it and send it to different providers, thus minimizing the need for trust towards all involved parties. Our solution implements privacy by design with data minimization and ensures that we learn as little as possible and as late as possible about our users.
Os Nossos Princípios

Privacidade
A privacidade é o nosso maior objetivo. Não recolhemos nenhum tipo de dados pessoais desnecessários, e os que recolhemos encriptamos até ao momento em que precisamos deles.

2. Software Gratuito
A Anastasis é um Software Gratuito e utiliza somente componentes que também o são. A nossa documentação está também completamente disponível e à disposição.

3. Be usable
O nosso foco é fornecer uma solução prática que seja útil para os utilizadores comuns e não apenas para especialistas.

4. Flexible trust model
Anastasis must not rely on the trustworthiness of individual providers. It must be possible to use Anastasis safely, even if a subset of the providers is malicious.

5. The user is in control
Anastasis must put the user in control: They get to decide which providers to use and which combinations of authentication steps will be required to restore their core secret. The core secret always remains exclusively under the user’s control, even during recovery.
Our Team

Berna Alp
Business

Sebastian Marchano
Technology

Florian Dold
Programming