Documentation

Explore the technical foundations, security protocols, and operational workflows that power the Kiraamo digital legal registry.

Platform Overview

Kiraamo is an enterprise-grade digital custody platform designed for the secure storage and instant verification of sensitive legal documents, primarily wills and inheritance records. In an era of digitisation, we bridge the gap between traditional legal requirements and military-grade technological security.

verified_user

Authenticated Access

Multilayered authentication ensures only authorised stakeholders can interact with sensitive records.

history_edu

Legal Compliance

Designed in consultation with legal experts to meet international document integrity standards.

Our Custody Model

Unlike traditional cloud storage, Kiraamo utilizes a "Zero-Trust" custody model. This means that documents are not just stored; they are cryptographically locked within a vault where the service provider has no means of accessing the content without explicit authorization.

security Core Custody Principles

  • • Document isolation via individual cryptographic containers.
  • • Automated audit trails for every access event.
  • • Geo-redundant storage for disaster recovery.

AES-256 Encryption

All sensitive data on Kiraamo is encrypted using AES-256-GCM (Advanced Encryption Standard). AES-256 is the first and only publicly accessible cipher approved by the U.S. National Security Agency (NSA) for protecting Top Secret information.

Our encryption protocol ensures that:

  • Files are encrypted at-rest on our system.
  • Encryption keys are managed via a hardware-backed Key Management System (KMS).
  • Data transmitted between the client and server is protected by TLS 1.3.

Version Immutability

Legal documents undergo changes. Kiraamo handles this through an immutable versioning system. When a document is updated, the previous version is not overwritten. Instead, a new, linked release is created.

Cryptographic Chaining

v1
SHA-256 HASH
v2
CURRENT RELEASE