Skip to content

Frequently Asked Questions (FAQ)

Get instant answers to the most common questions about Fractum, the enterprise-grade secret sharing tool using Shamir's Secret Sharing and AES-256-GCM encryption.

What is Fractum?

Fractum is an enterprise-grade secret sharing tool that uses Shamir's Secret Sharing (SSS) and AES-256-GCM encryption to split sensitive files into encrypted shares. It's designed for secure cold storage of passwords, crypto wallets, SSH keys, and critical documents.

Key features:

  • Shamir's Secret Sharing algorithm for mathematical security
  • AES-256-GCM military-grade encryption for file protection
  • Offline operation for air-gapped environments
  • Cross-platform support (Windows, macOS, Linux)
  • Docker containerization for maximum isolation

How does Shamir's Secret Sharing work in Fractum?

Shamir's Secret Sharing splits your encrypted file into multiple shares using polynomial mathematics. You define:

  • Threshold (K): Minimum shares needed to reconstruct the file
  • Total shares (N): Total number of shares created

Example: With K=3 and N=5, you need any 3 of the 5 shares to reconstruct your original file.

Mathematical security guarantee: Fewer than K shares provide zero information about the original file - this is information-theoretically secure.

What can I protect with Fractum?

Fractum can secure any sensitive file or data:

  • Cryptocurrency wallets and private keys
  • SSH keys and certificates
  • Password databases and credential files
  • Critical business documents and contracts
  • Personal sensitive data like tax records
  • Encryption keys and certificates
  • Configuration files with sensitive settings

File size limits: Fractum can handle files from a few bytes up to several gigabytes.

Can Fractum be used offline for air-gapped security?

Yes, Fractum is specifically designed for offline operation and air-gapped environments.

Offline capabilities:

  • No internet connection required for encryption or decryption
  • All cryptographic operations happen locally
  • Perfect for high-security environments
  • No data transmission to external servers
  • Complete network isolation support

Best practice: Use Fractum on an air-gapped system that has never been connected to the internet for maximum security.

What encryption standard does Fractum use?

Fractum uses AES-256-GCM encryption, which provides:

  • AES-256: Advanced Encryption Standard with 256-bit keys
  • GCM mode: Galois/Counter Mode for authenticated encryption
  • Military-grade security: Same standard used by governments worldwide
  • Authentication: Prevents tampering and ensures data integrity
  • Performance: Fast encryption/decryption operations

Security guarantee: AES-256 is considered quantum-resistant for the foreseeable future.

How do I choose the right threshold and share settings?

Threshold selection depends on your security vs. accessibility needs:

Use Case Threshold (K) Total Shares (N) Security Level
Personal backup 2-3 3-5 Basic
Small team 3-4 5-7 Medium
Organization 5-7 8-12 High
Maximum security 7+ 10-15 Maximum

Key considerations:

  • Higher K = More security but harder recovery
  • Extra shares (N-K) provide backup against loss
  • Optimal ratio: K should be 60-70% of N for balanced security

How secure is Fractum compared to other solutions?

Fractum provides information-theoretic security, which means:

  • Mathematical proof: Security is guaranteed by mathematics, not just computational difficulty
  • No brute force attacks: Impossible to guess the secret with fewer than K shares
  • Zero-knowledge: Individual shares reveal nothing about the original data

Comparison with other methods:

  • More secure than simple password protection
  • More secure than single encryption key storage
  • Equivalent security to enterprise HSMs but more accessible
  • Better disaster recovery than single-point storage

Why choose Fractum over enterprise solutions like HashiCorp Vault or HSMs?

Fractum is designed for different use cases than active secret managers:

When to use Fractum (Cold Storage):

  • Long-term secret storage (years/decades)
  • Emergency recovery scenarios
  • Air-gapped environments with no infrastructure
  • Personal use cases without enterprise budgets
  • Backup encryption keys and root CA private keys
  • Cryptocurrency cold storage and seed phrases

When to use Vault/HSMs (Active Management):

  • Daily secret operations and API key rotation
  • Enterprise infrastructure with dedicated teams
  • High-frequency operations (thousands per day)
  • Runtime application secrets and service authentication

Cost comparison: HSMs cost thousands of dollars and require infrastructure. Fractum is free and works everywhere.

Where should I store the shares?

Strategic share distribution is critical for security:

Recommended storage locations:

  • Bank safe deposit boxes (professional security)
  • Home safes (fire-rated, burglary-resistant)
  • Attorney offices (legal protection)
  • Corporate vaults (enterprise environments)
  • Trusted family/colleagues (geographic distribution)
  • Multiple USB drives (different manufacturers to prevent simultaneous failure and bit rot)

Security principles:

  • Geographic separation: Different cities/countries
  • Independent custodians: People who don't know each other
  • Secure communication: Encrypted channels for coordination
  • Environmental protection: Waterproof, fireproof storage

What happens if I lose some shares?

Fractum's threshold system provides built-in redundancy:

  • Shares needed: Only K shares (threshold) required for recovery
  • Buffer shares: Extra shares (N-K) protect against loss
  • Example: With 3-of-5 threshold, you can lose 2 shares and still recover

Recovery scenarios:

  • 1-2 shares lost: Full recovery possible with remaining shares
  • Multiple shares lost: Recovery if you still have K shares
  • Below threshold: Recovery impossible - this is by design for security

Best practice: Create more shares than your minimum threshold to protect against loss.

Can someone access my data with one share?

No. This is guaranteed by Shamir's Secret Sharing mathematics.

Security properties:

  • Information-theoretic security: Having K-1 shares provides zero information
  • No partial reconstruction: You cannot get "part" of the original file
  • No brute force possible: Cannot guess the missing shares
  • Quantum-resistant: Even quantum computers cannot break this property for the foreseeable future

Example: With a 3-of-5 threshold, having 1 or 2 shares tells an attacker nothing about your original file.

How does Fractum protect against coercion attacks and kidnapping?

Fractum's distributed model provides several protections against physical coercion:

Time-based protection:

  • Geographic distribution requires attackers to travel to multiple locations
  • Multiple custodians means more people to locate and compromise
  • Recovery delays provide time for authorities to intervene

Practical protections:

  • Individual shares are useless - no single person can be forced to reveal everything
  • Shared knowledge spreads risk across multiple people
  • Physical separation prevents attackers from quickly gathering enough shares

Example: With shares in different states/countries, an attacker would need days or weeks to collect the threshold, giving plenty of time for intervention.

What about USB drive failure and bit rot?

Long-term storage media degradation is a real concern:

USB drive limitations:

  • Bit rot: Flash memory loses charge over 3-5 years
  • Temperature sensitivity: Heat accelerates degradation
  • Wear leveling: Drives with more use fail faster

Fractum's built-in protections:

  • Redundancy by design: Lose N-K shares without data loss
  • Multiple storage methods: Mix USB, paper, metal, cloud storage
  • Vendor diversity: Use drives from different manufacturers

Best practices:

  • Annual refresh cycles: Copy data to new drives yearly
  • Multiple media types: Don't rely solely on USB drives
  • Verification procedures: Check share integrity regularly

How does Fractum handle memory security?

Fractum implements defense-in-depth memory protection:

Memory clearing techniques:

  • Secure overwriting: Multiple passes with different patterns
  • Immediate clearing: Sensitive data cleared as soon as possible
  • Memory locking: Prevents swapping to disk during operations

Limitations and considerations:

  • Python string immutability: Some string operations create copies
  • Garbage collection: Python's GC may delay memory clearing
  • Best practice: Run on dedicated, trusted systems for maximum security

Is Fractum open source?

Yes, Fractum is open source software.

Open source benefits:

  • Transparent code: Anyone can audit the cryptographic implementation
  • Community verification: Security researchers can validate the code
  • No vendor lock-in: You control your own security
  • Continuous improvement: Community contributions enhance security

Where to find it:

How does Fractum compare to traditional password managers?

Fractum and password managers serve different purposes:

Fractum advantages:

  • Cold storage focus: Designed for long-term, infrequent access
  • Air-gapped security: No internet required
  • Mathematical security: Information-theoretic guarantees
  • Distributed storage: No single point of failure
  • File-level protection: Encrypts entire files, not just passwords

Password manager advantages:

  • Daily use convenience: Quick access for regular passwords
  • Browser integration: Automatic form filling
  • Sync across devices: Cloud synchronization
  • User-friendly interface: Optimized for frequent access

Best practice: Use both - password managers for daily passwords, Fractum for critical long-term secrets.

What if non-technical family members need to recover my secrets?

This is a critical consideration for inheritance planning:

Challenges for non-technical users:

  • Complex recovery procedures require technical knowledge
  • Software dependencies may become unavailable over time
  • Multi-step processes can be confusing under stress

Fractum's solutions:

  • Self-contained shares: Each share includes the recovery application
  • Cross-platform compatibility: Works on any major operating system
  • Detailed documentation: Step-by-step recovery instructions is selfcontained into the .zip files
  • Simple command structure: Minimal technical knowledge required

Best practices for family recovery:

  • Document everything: Write clear instructions for share locations
  • Practice recovery: Train family members on the process
  • Legal integration: Include instructions in will or trust documents
  • Professional help: Consider involving attorneys or technical advisors

Is Fractum overkill for most users?

Fractum is designed for specific high-stakes scenarios:

When Fractum makes sense:

  • Cryptocurrency holdings worth significant money
  • Business-critical encryption keys protecting valuable data
  • Legal documents that cannot be replaced
  • Infrastructure secrets protecting important systems
  • Family inheritance planning for digital assets

When simpler solutions work:

  • Daily passwords - use a password manager
  • Low-value data - regular backups are sufficient
  • Frequently accessed secrets - active secret managers like Vault

Rule of thumb: If losing the secret would cost you more than $1,000 or cause significant personal/business disruption, Fractum is worth considering.

How can I test my shares without exposing the secret?

This is an important operational concern for long-term storage:

Current limitations:

  • Full reconstruction required: Currently need to decrypt to verify shares
  • Security trade-off: Testing exposes the secret temporarily

Planned improvements:

  • Zero-knowledge verification: Planned feature to verify shares without reconstruction
  • Commitment schemes: Mathematical proofs that shares are valid

Current best practices:

  • Test with dummy data: Practice the recovery process with non-sensitive files
  • Partial testing: Verify individual share integrity and format
  • Scheduled reviews: Regular audits of share storage locations

Why not just distribute copies of the encryption key?

Simple key distribution has significant security weaknesses:

Problems with key copying (1-of-N):

  • Single point of compromise: If any copy is stolen, entire secret is exposed
  • Equal trust required: All storage locations must be completely secure
  • Binary security: Either completely secure or completely compromised

Shamir's advantages (K-of-N):

  • Partial compromise protection: Steal K-1 shares, learn nothing
  • Flexible trust models: Can use "lower security" locations safely
  • Gradual failure: Security degrades gracefully as shares are compromised

Real-world example: Store one share in cloud storage, one with family, one in home safe. Even if cloud storage is breached, your secret remains secure.

Key Takeaways

In summary, Fractum provides:

Military-grade security using AES-256-GCM and Shamir's Secret Sharing
Information-theoretic protection that's mathematically guaranteed
Offline operation for air-gapped and high-security environments
Flexible threshold settings to balance security and accessibility
Cross-platform support for Windows, macOS, and Linux
Open source transparency for community audit and verification
Enterprise-grade solution for critical data protection
Coercion resistance through distributed share storage
Long-term reliability with built-in redundancy against media failure

Perfect for: Cryptocurrency wallets, SSH keys, critical documents, password databases, backup encryption keys, and any sensitive data requiring long-term secure storage with distributed access control.

Still have questions?

Get additional help: