diff --git a/opsec/moneroinheritance/container_decrypt/1.PNG b/opsec/moneroinheritance/container_decrypt/1.PNG new file mode 100644 index 0000000..4a42b3b Binary files /dev/null and b/opsec/moneroinheritance/container_decrypt/1.PNG differ diff --git a/opsec/moneroinheritance/container_decrypt/10.jpg b/opsec/moneroinheritance/container_decrypt/10.jpg new file mode 100644 index 0000000..7545f97 Binary files /dev/null and b/opsec/moneroinheritance/container_decrypt/10.jpg differ diff --git a/opsec/moneroinheritance/container_decrypt/11.PNG b/opsec/moneroinheritance/container_decrypt/11.PNG new file mode 100644 index 0000000..6ac5fa5 Binary files /dev/null and b/opsec/moneroinheritance/container_decrypt/11.PNG differ diff --git a/opsec/moneroinheritance/container_decrypt/12.PNG b/opsec/moneroinheritance/container_decrypt/12.PNG new file mode 100644 index 0000000..19e9631 Binary files /dev/null and b/opsec/moneroinheritance/container_decrypt/12.PNG differ diff --git a/opsec/moneroinheritance/container_decrypt/13.PNG b/opsec/moneroinheritance/container_decrypt/13.PNG new file mode 100644 index 0000000..892c3fe Binary files /dev/null and b/opsec/moneroinheritance/container_decrypt/13.PNG differ diff --git a/opsec/moneroinheritance/container_decrypt/14.PNG b/opsec/moneroinheritance/container_decrypt/14.PNG new file mode 100644 index 0000000..23a033c Binary files /dev/null and b/opsec/moneroinheritance/container_decrypt/14.PNG differ diff --git a/opsec/moneroinheritance/container_decrypt/15.PNG b/opsec/moneroinheritance/container_decrypt/15.PNG new file mode 100644 index 0000000..58dd55e Binary files /dev/null and b/opsec/moneroinheritance/container_decrypt/15.PNG differ diff --git a/opsec/moneroinheritance/container_decrypt/16.PNG b/opsec/moneroinheritance/container_decrypt/16.PNG new file mode 100644 index 0000000..c315c28 Binary files /dev/null and b/opsec/moneroinheritance/container_decrypt/16.PNG differ diff --git a/opsec/moneroinheritance/container_decrypt/17.PNG b/opsec/moneroinheritance/container_decrypt/17.PNG new file mode 100644 index 0000000..bf7ff16 Binary files /dev/null and b/opsec/moneroinheritance/container_decrypt/17.PNG differ diff --git a/opsec/moneroinheritance/container_decrypt/18.PNG b/opsec/moneroinheritance/container_decrypt/18.PNG new file mode 100644 index 0000000..2fc2bb7 Binary files /dev/null and b/opsec/moneroinheritance/container_decrypt/18.PNG differ diff --git a/opsec/moneroinheritance/container_decrypt/19.PNG b/opsec/moneroinheritance/container_decrypt/19.PNG new file mode 100644 index 0000000..3beb2d2 Binary files /dev/null and b/opsec/moneroinheritance/container_decrypt/19.PNG differ diff --git a/opsec/moneroinheritance/container_decrypt/2.PNG b/opsec/moneroinheritance/container_decrypt/2.PNG new file mode 100644 index 0000000..40e0ecf Binary files /dev/null and b/opsec/moneroinheritance/container_decrypt/2.PNG differ diff --git a/opsec/moneroinheritance/container_decrypt/20.PNG b/opsec/moneroinheritance/container_decrypt/20.PNG new file mode 100644 index 0000000..66835e5 Binary files /dev/null and b/opsec/moneroinheritance/container_decrypt/20.PNG differ diff --git a/opsec/moneroinheritance/container_decrypt/3.PNG b/opsec/moneroinheritance/container_decrypt/3.PNG new file mode 100644 index 0000000..3b37311 Binary files /dev/null and b/opsec/moneroinheritance/container_decrypt/3.PNG differ diff --git a/opsec/moneroinheritance/container_decrypt/3containers.PNG b/opsec/moneroinheritance/container_decrypt/3containers.PNG new file mode 100644 index 0000000..2683e12 Binary files /dev/null and b/opsec/moneroinheritance/container_decrypt/3containers.PNG differ diff --git a/opsec/moneroinheritance/container_decrypt/4.PNG b/opsec/moneroinheritance/container_decrypt/4.PNG new file mode 100644 index 0000000..978f6e5 Binary files /dev/null and b/opsec/moneroinheritance/container_decrypt/4.PNG differ diff --git a/opsec/moneroinheritance/container_decrypt/5.PNG b/opsec/moneroinheritance/container_decrypt/5.PNG new file mode 100644 index 0000000..4bb43b8 Binary files /dev/null and b/opsec/moneroinheritance/container_decrypt/5.PNG differ diff --git a/opsec/moneroinheritance/container_decrypt/6.PNG b/opsec/moneroinheritance/container_decrypt/6.PNG new file mode 100644 index 0000000..2e19111 Binary files /dev/null and b/opsec/moneroinheritance/container_decrypt/6.PNG differ diff --git a/opsec/moneroinheritance/container_decrypt/7.PNG b/opsec/moneroinheritance/container_decrypt/7.PNG new file mode 100644 index 0000000..30670f8 Binary files /dev/null and b/opsec/moneroinheritance/container_decrypt/7.PNG differ diff --git a/opsec/moneroinheritance/container_decrypt/8.PNG b/opsec/moneroinheritance/container_decrypt/8.PNG new file mode 100644 index 0000000..cd05d94 Binary files /dev/null and b/opsec/moneroinheritance/container_decrypt/8.PNG differ diff --git a/opsec/moneroinheritance/container_decrypt/9.PNG b/opsec/moneroinheritance/container_decrypt/9.PNG new file mode 100644 index 0000000..c47ff28 Binary files /dev/null and b/opsec/moneroinheritance/container_decrypt/9.PNG differ diff --git a/opsec/moneroinheritance/container_decrypt/cd.jpg b/opsec/moneroinheritance/container_decrypt/cd.jpg new file mode 100644 index 0000000..33d483f Binary files /dev/null and b/opsec/moneroinheritance/container_decrypt/cd.jpg differ diff --git a/opsec/moneroinheritance/container_decrypt/hdd.png b/opsec/moneroinheritance/container_decrypt/hdd.png new file mode 100644 index 0000000..5284b21 Binary files /dev/null and b/opsec/moneroinheritance/container_decrypt/hdd.png differ diff --git a/opsec/moneroinheritance/index.html b/opsec/moneroinheritance/index.html index 3967448..21de712 100644 --- a/opsec/moneroinheritance/index.html +++ b/opsec/moneroinheritance/index.html @@ -144,11 +144,70 @@ - - - - - + +
+
+
+
+

Inheritance process



+

This section describes how the actual inheritance process is going to like, it assume no technique background for its reader

+

There is some crypto left from your gifter, you need below steps to recover them:

+

First you need to find your gifter's safe, it should contain some storage device with some files called "container" and "key", plus a password

+

Some step below require participation of your gifter's lawyer, but we will continue your technical setup first

+

First open your lovely windows, and we open the veracrypt website https://www.veracrypt.fr in browser

+ +

Download veracrypt as showed

+

Find the downloaded veracrypt installed, right click on it and click property, choose digital signature as showed in picture

+ +

Make sure the digital signature is displayed as "ok", otherwise do not use!!!

+ +

Now install it, do not change any setting and install in default setup

+ +

Click next

+ +

And Install

+

After you see this warning, click yes

+ +

Next you should find a hard drive or cd, which is left by the people who gift you money. It should look like something like this

+ +

Or this

+ +

You should fild three files called container 1, container 2 and container 3 inside, if not search your own cloud drive with name "container". For example your microsoft onedrive

+ +

Seach on your own microsoft, google and apple cloud storage

+ +

If you searched all the cloud storage but cannot find any files named container, and you are sure the physical copy of the container at home is also lost, then the money is gone forever! I am sorry.

+

You should also find a file called key1 from storage devices in your gifter's safe, if somehow this is lost due to disaster or mistake, you are in trouble but it is still fixable, continue reading

+ +

If you have found the keyfile 1 and containers, you should now wait for a lawyer to contact you, if your gifter has properly setup the procedure with lawyers, you should receive their message and the keys in mail or in person

+ +

Now let's assume you have received another key, named key2 from the lawyer, now we have two keys and we can decrypt the container for getting your money!

+ +

Open veracrypt and click the "select file" button, select file called container 1

+ +

Choose a drive and click mount

+ +

Enter the password you found in the safe, or find a family member that knows the password. Next choose keyfile tickbox, and click the button on the right

+ +

Choose add files and select key1 and key2 you received

+

Click ok and decrypt the container!

+ +

If everything worked correctly, you should see a new mounted disk on your file explorer

+ +

You got the seed! Do not tell that anybody, restore it in a monero wallet, for example download cake wallet on your phone, input the seed for the money!

+

If you get key3 from another lawyer, don't panic, it also works if you have key1

+ +

But choose container 3 instead of container 1 in veracrypt before decryption, and use key1 and key3 in the keyfile section

+ +

At last is the worst situation, if key 1 is lost like your house is destroyed in fire, you need to contact both lawyers to recover the money. You have to find them both to get key2 and key3

+ +

If you are lucky and get the keys from both lawyer, choose container 2 in veracrypt, use key 2 and key 3 for decryption

+ +

You can now also access your money!

+
+
+
+