About ICEShare

What is ICEShare?

ICEShare (In Case of Emergency Share) is a secure emergency access system designed to help you share sensitive information with trusted contacts. Our service ensures that critical information can be accessed by designated individuals only when needed, while maintaining the highest standards of security and privacy.

Why ICEShare Exists

In emergency situations, access to certain information can be critical. Whether it's passwords for important accounts, medical information, legal documents, or other sensitive data, ICEShare provides a secure way to grant emergency access to trusted individuals.

Traditional methods of sharing sensitive information - writing it down, sending via email, or using notes apps - are either insecure or inaccessible when needed most. ICEShare solves this problem with enterprise-grade encryption and a one-time access model.

How ICEShare Works

  1. Create: You securely share sensitive information with a trusted contact (trustee)
  2. Encrypt: Your information is encrypted using military-grade encryption before storage
  3. Notify: Your trustee receives an email with a secure one-time access link
  4. Emergency Access: In case of emergency, the trustee can access the information once
  5. Auto-Delete: After viewing, the information is permanently and irreversibly deleted
  6. Notification: You're notified whenever the emergency access is used

Our Security Commitment

Security is our top priority. ICEShare implements multiple layers of protection:

  • End-to-End Encryption: All sensitive data is encrypted using XSalsa20-Poly1305 authenticated encryption
  • Zero-Knowledge Architecture: We cannot access your encrypted information
  • One-Time Access: Information is deleted immediately after viewing
  • Key Management: Encryption keys protected by HashiCorp Vault
  • Audit Logging: Complete trail of all access attempts
  • Rate Limiting: Protection against brute force attacks
  • IP Blocking: Automatic blocking of abusive sources

Common Use Cases

Personal Use

  • Banking passwords for spouse/partner
  • Social media account recovery
  • Medical information for family
  • Important document locations

Business Use

  • Server access credentials
  • Critical system passwords
  • Emergency contact information
  • Disaster recovery procedures

Management Features

As a creator, you maintain full control over your emergency access shares:

  • View Status: Check if your share has been accessed
  • Revoke Access: Cancel access at any time
  • Extend Expiry: Extend the one-year expiration period
  • Replace Secret: Update the shared information
  • Delete Permanently: Remove the share entirely

Technology Stack

ICEShare is built using modern, proven security technologies:

  • Python/Flask for application logic
  • PostgreSQL for secure data storage
  • HashiCorp Vault for key management
  • Redis for rate limiting
  • NaCl (libsodium) for encryption
  • Nginx with TLS 1.3 for secure communications

Open Source

ICEShare's security model is transparent and verifiable. While the service is provided as-is, the core architecture follows industry best practices and security standards.

Get Started

Ready to set up emergency access for your important information? Create your first share now - it takes less than a minute.

Contact Us

Have questions or need support? Contact us - we're here to help.