The Temporis Manifesto: The Evolution of Your Digital Sovereignty
From Itylos to Temporis: Master time to protect your most precious secrets.
Itylos was born from a need for freedom: ephemeral messaging. But true freedom also means being able to choose to keep what really matters, away from prying eyes, until the right moment.
Temporis transforms the ephemeral into a legacy. We designed this protocol so that your secrets are no longer vulnerabilities, but assets protected by cryptography and time.
AES-256 Encryption
A Zero-Knowledge architecture: your key is unique, and we do not possess it.
Immutable Ledger
Every interaction is carved into a public blockchain to guarantee absolute integrity.
WIPE Protocol
After retrieval, data is physically obliterated from our Swiss servers.
Scenarios: What to Entrust to Your Capsule?
Crypto Heritage
Secure your Seed Phrases (12/24 words) and private wallet keys (Bitcoin, Ethereum) to prevent any digital theft.
Family Secrets
Share precious photos, life stories, or love letters to be opened only in 10, 20, or 30 years.
Whistleblowers
Use Temporis as a "Dead Man Switch": if you don't deactivate the lock, your evidence is released automatically.
Business Secrecy
Protect patents, critical source codes, or strategic contracts before an official announcement.
Digital Identity
Keep an encrypted copy of your ID documents or property titles in case of a major accident.
Private Galleries
Encapsulate visual memories that should only be revealed on a specific anniversary date.