Security measures meant to protect you can backfire, locking you out.
Two-factor Authentication
Password Managers
End-to-end Encrypted Apps
DiceKeys are the back-up you can rely on to restore your accounts and data.
How it works
01.
Roll the dice into the box
The dice fall into the bottom of the box to form a 5x5 square. The letters and digits are like a really-long password.
02.
Scan them into the app
The DiceKeys app uses your device camera to read your key. The app can generate passwords or be used as a backup key for other apps.
03.
Lock the lid to seal it
The lid locks the arrangement of dice in place, so that you can re-scan your key when you next need it.

Roll the dice into the box

The dice fall into the bottom of the box to form a 5x5 square. The letters and digits are like a really-long password.

Scan them into the app

The DiceKeys app uses your device camera to read your key. The app can generate passwords or be used as a backup key for other apps.

Lock the lid to seal it

The lid locks the arrangement of dice in place, so that you can re-scan your key when you next need it.
About the Business
A Transparent Business Model

We have designed your DiceKey to last a lifetime, so most customers should only ever need to buy one.

We make money when you buy that DiceKey — and that’s it.

There’s no subscription fee for the DiceKeys app.

The price of a DiceKey covers our cost to invent, design, and produce both the hardware and software.

In addition to covering our costs, we also hope to make an honest profit.

Open Source

Technology that you can rely on over your lifetime needs to work even if we’re no longer around to support it.

You can check out the source code for our apps, and see who has contributed, via our GitHub repository.

Funded by You

Don’t bother looking for the big-name investors backing us—there aren’t any. Companies funded by venture capitalists are obligated to make them as much money as possible, typically through subscriptions for recurring revenue. The subscription model requires companies to make customers ever more dependent on them so that they their customers will keep paying up, month after month, year after year. The subscription model is antithetical to our goal of making you more self sufficient as you take control of your digital identity.

Our customers should love us, not need us. That’s why we opted to grow at a sustainable pace, starting out self funded and then raising capital from our customers when we were ready to manufacture our first production-quality DiceKeys.

Funded by You

Don’t bother looking for the big-name investors backing us—there aren’t any. Companies funded by venture capitalists are obligated to make them as much money as possible, typically through subscriptions for recurring revenue. The subscription model requires companies to make customers ever more dependent on them so that they their customers will keep paying up, month after month, year after year. The subscription model is antithetical to our goal of making you more self sufficient as you take control of your digital identity.

Our customers should love us, not need us. That’s why we opted to grow at a sustainable pace, starting out self funded and then raising capital from our customers when we were ready to manufacture our first production-quality DiceKeys.

Open Source

Technology that you can rely on over your lifetime needs to work even if we’re no longer around to support it.

You can check out the source code for our apps, and see who has contributed, via our GitHub repository.

Press Quotes
With little more than a plastic contraption that looks a bit like a Boggle set... DiceKeys creates a highly random, mathematically unguessable key.
Andy Greenberg, Wired
“DiceKeys enable you to... create a backup security key with an astonishing 196 bits of entropy”
Davey Winder, Forbes
With little more than a plastic contraption that looks a bit like a Boggle set... DiceKeys creates a highly random, mathematically unguessable key.
Andy Greenberg, Wired
“DiceKeys enable you to... create a backup security key with an astonishing 196 bits of entropy”
Davey Winder, Forbes
Leadership
Stuart Schechter
Inventor
Stuart's career as an inventor and researcher in the field of usable security research spanned his years at Microsoft Research, MIT Lincoln Laboratory, and his PhD at Harvard University. He currently teaches Usable Privacy and Security for the University of California at Berkeley's Master's Program in Cybersecurity.
Joseph Bonneau
Advisory Board
Joseph Bonneau is an Assistant Professor at NYU and was formerly affiliated with Stanford, Princeton, Cambridge (PhD), the Electronic Frontier Foundation, Google, Yahoo, and Cryptography Research. He is known for groundbreaking work on authentication, including analysis of 70m passwords at Yahoo, and for his security analyses of cryptocurrencies.
Bruce Schneier
Advisory Board
Bruce Schneier is an internationally renowned security technologist, called a "security guru" by The Economist. He is the author of over one dozen books -- including his latest, Click Here to Kill Everybody – as well as hundreds of articles, essays, and academic papers. His influential newsletter "Crypto-Gram" and his blog "Schneier on Security" are read by over 250,000 people.