Recover your encrypted backups offline
Encrypted backup + password → recover in-app or with the Self-Contained Recovery Kit.
Encrypted backup formats: QR · file · ciphertext · SSS shares
Recovery paths
Encrypted backup + password → recover in-app or with the Recovery Kit.
Same password for either recovery option
Self-Contained Recovery Kit (Windows ZIP — no install required)
Exported from inside the app (Lifetime Pro). Recover on any Windows PC with the CLI tools — no app, no login. Windows now, Linux beta, macOS planned.
- GitHub Releases: installers,
manual_decrypt,checksums.txt(SHA-256). - Exported from inside the app (Lifetime Pro): Self-Contained Recovery Kit Windows ZIP (
recovery_cli+ guide); not on GitHub Releases.
Verify downloads with checksums.txt; see verification steps below.
Verify download (SHA-256)
In checksums.txt, find your filename and compare the SHA-256.
Windows (PowerShell)
Expected hash from checksums:
Select-String -Path .\checksums.txt -Pattern "<YOUR_FILENAME>"
Compute actual hash:
(Get-FileHash -Algorithm SHA256 "<YOUR_FILENAME>").Hash
Compare the two.
macOS
grep "<YOUR_FILENAME>" checksums.txt
shasum -a 256 "<YOUR_FILENAME>"
Linux
grep "<YOUR_FILENAME>" checksums.txt
sha256sum "<YOUR_FILENAME>"
Recovery steps Windows now, Linux beta, macOS planned.
Works on any Windows PC — no app, no login.
Windows now, Linux beta, macOS planned.
-
Download the app & tools from GitHub Releases (or export the Self-Contained Recovery Kit Windows ZIP inside the app).
-
Extract and run
recovery_cli. -
Choose standard (single file) or Shamir (SSS) and run the matching command (see toggles below).
Show CLI commands (standard)
recovery_cli standard "your_backup.enc"Show CLI commands (Shamir / SSS)
recovery_cli sss "share1.enc" "share2.enc" "share3.enc"(enough to meet threshold)Tools & OS support
manual_decryptis available on Windows now (Linux beta, macOS planned).recovery_cliis included in the exported Windows ZIP. -
Enter your password when prompted. Your secret is decrypted locally.
-
Use the recovered data to restore access.
In-app: Open MyColdKey → Recover → choose Scan QR, Import File, or Paste Text. Same password and encrypted backup; decrypt inside the app.
Choose your redundancy level: Standard or Shamir (SSS)
Standard backup
One encrypted file (QR, file, or single export). Recover with that encrypted backup and your password.
SSS (Shamir)
Your secret is split into N shares; you need M of N to recover. Use when you want redundancy (e.g. family, multiple locations).
Best for multi-location storage or family recovery.
Store copies across locations
Mix with what you already own — without increasing plaintext exposure.
Your hardware wallet protects the seed phrase. MyColdKey protects the copies — encrypted, replicable, and vendor-independent.
One encrypted backup. Store copies across locations. Control stays with you.
Low-profile redundancy
Recommended for theft-risk reduction; not required for recovery.
FAQ
Can I test recovery before trusting it?
What if I lose the password?
What if I lose some Shamir shares?
Is login required for recovery?
What is the Self-Contained Recovery Kit?
manual_decrypt tools, and checksums.txt. Export the Self-Contained Recovery Kit (Windows ZIP with recovery_cli + guide) from inside the app.Which format should I use?
Ready to own your recovery?
Get launch updates Back to HomeTip: Store the tools offline (USB / air-gapped drive) alongside your encrypted backups.