Shards does not store your secret, your shards, or your recovery plan. Sensitive operations happen locally in your browser — and the source is open, so you don't have to take our word for it.
Three columns. The first is what your browser does. The second is what our server does. The third is what never leaves your device under any circumstance.
Eight properties of the protocol. Each is testable — by reading the source, watching network traffic, or running the tool offline.
All cryptographic work runs in your browser. No remote computation.
Our server holds the static app files. It does not see your data.
No email, no login, no profile. The tool is anonymous by design.
Every line is on GitHub. Cloneable, auditable, runnable offline.
Any M of N shards reconstruct. Standard Shamir secret sharing.
Fewer than M shards yield zero information about the secret.
Once loaded, the app works without internet. Cache it, run it later.
One button removes everything. Browser memory is the only memory.
Shamir's Secret Sharing is information-theoretically secure when implemented correctly. Fewer than the required number of shards reveal no information about the secret — to a classical computer, a quantum computer, or any other computer that may exist in the future.
That isn't because we found a faster algorithm. It's because the missing information is not encoded in the available shards at all. The polynomial that interpolates 2 points in a 3-of-5 scheme has infinitely many extensions to a third point. Every possible secret remains equally consistent with what an attacker can see.
Precise claim: the threshold split itself does not rely on computational hardness. Other risks — such as malware on the device performing the split, phishing of the recovering party, browser extension key-loggers, or compromised printers — are outside the cryptographic guarantee. Quantum-safe is a property of the math, not a property of the room you're standing in.
A polynomial of degree M − 1 has exactly M coefficients. The secret is one of them. The shards are points the polynomial passes through.
Threshold custody solves one specific problem — the single point of failure. It is not a substitute for general operational security. We are explicit about both sides.
The cryptography only protects what the procedure preserves. These rules close the gaps the math cannot.
The product is the source code. Everything else — this domain, our copy, our brand — is auxiliary. If we vanish tomorrow, your shards still recover.
Six artifacts published alongside the code. Each is independently verifiable.