Backup & Recovery Procedures
How Bervice ensures your encrypted data and keys remain recoverable even in the event of device loss, hardware failure, or unexpected outages—without ever compromising your privacy.
In Bervice, your files and passwords are end-to-end encrypted locally before upload, meaning only you hold the decryption keys. This privacy model affects how backups and recovery are handled: we cannot restore your keys if you lose them, so secure key management is essential.
Key Backups. When setting up Bervice, you are prompted to securely store your recovery phrase or key file offline. We recommend printing it on paper or using a steel backup, stored in two physically separate, secure locations. This is your ultimate recovery method.
Data Redundancy. Your encrypted content is pinned across multiple decentralized storage nodes in different geographic locations. This ensures high availability and protection against single-point failures in storage providers or regions.
Automated Metadata Backups. Subscription metadata, referral history, and integrity proofs (e.g., CIDs of encrypted files) are backed up to multiple secure servers and verified daily using cryptographic checksums. This allows you to re-link existing encrypted content after reinstalling the app or recovering your keys.
Recovery Steps in Case of Device Loss:
- Install Bervice on your new device.
- Restore your keys using your recovery phrase or key file.
- Sync your subscription status via the blockchain.
- Re-fetch encrypted files from the decentralized storage network using stored CIDs.
Disaster Recovery. In the unlikely event of a catastrophic failure in our infrastructure, decentralized storage ensures your encrypted files remain retrievable via public nodes. Our internal continuity plan includes maintaining redundant pinning clusters, off-site backups of metadata, and a rotating incident response team.
For more detailed guidance, see Key Management and Decentralized Storage Explained.