Frequently Asked Questions (FAQs)

Your Guide to Quick Answers on Shieldwall's Features, Usage, and More

Introducing Your personal actionable insurance vault: Digital. Simple. Safe.

Discover the ultimate solution for managing your personal information and data with unparalleled control and security. Our Encrypted Digital Privacy Chest offers a robust platform where you can safeguard your sensitive details or share them selectively, according to your discretion.

At the core of our service is a HealthPing check mechanism, meticulously designed to adapt to your unique occupational needs and personal preferences. This customizable feature ensures that your data not only remains secure but is also accessible and manageable in a way that aligns with your lifestyle and requirements.

Experience peace of mind knowing that your privacy is protected with state-of-the-art encryption, while also enjoying the flexibility to share your information on your terms. Welcome to a new era of personalized data security.

HealthPing is a personalized service designed to enhance individual security and data protection through a proactive health-check mechanism tailored to each user's specific needs and preferences. It acts as a component of the Shieldwall system, which serves as a personal, actionable insurance vault allowing users to protect or share their sensitive information selectively.

How HealthPing works:

  • Customization: Users can tailor HealthPing according to their occupational requirements and personal preferences, ensuring the service aligns with their unique lifestyle and needs.
  • Scheduling: HealthPing allows users to schedule regular status checks via various mediums, such as email. These checks can be set to recur every 30 days or any other predefined interval, or they can be a one-time, scheduled for a specific date and time.
  • Monitoring: The service continuously monitors the user's response to these scheduled pings. If a user fails to validate their status within a specified time frame, it triggers pre-configured actions.

Features:

  • Automated Checks: HealthPing automates the process of checking on a user's well-being or status through scheduled pings, minimizing the need for manual intervention.
  • Multiple Mediums: Users can receive HealthPing checks through different mediums, providing flexibility and ensuring they can be reached in the most convenient way possible.
  • Recurring or One-Time Schedules: Flexibility in scheduling allows users to set up HealthPing as a recurring check or a one-time event based on their needs and circumstances.
  • Pre-Configured Actions: In the event of a non-response, HealthPing executes actions predetermined by the user. These can include:
    • Sending an automated email to a trusted contact
    • Sharing specific files with designated individuals
    • Executing an API call to trigger other services or actions
    • Making certain files publicly accessible via a pre-shared URL
    • And other pre-defined actions

Actions within the HealthPing service are predefined responses that are automatically executed when a user does not respond to a scheduled HealthPing check. These are critical components of the HealthPing service, allowing users to set up a safety net or contingency plan tailored to their personal needs and preferences. Here's a detailed breakdown of what Actions entail and how they function:

  • Automated Responses: Actions are automated tasks that the system carries out without any need for manual intervention once they are triggered.
  • User-Defined: Each Action is set up by the user according to their specific requirements and scenarios they anticipate.

Actions can vary widely based on the user's needs and the level of response they deem necessary. Some examples include:

  • Sending Automated Emails: If a user fails to respond to a HealthPing, the system can automatically send an email to a person of the user's trust. This could be a family member, friend, or even a professional contact, informing them of the user's non-response and potentially prompting them to check in.
  • Sharing Files: Users can pre-select certain files to be shared automatically with specified individuals or groups if they do not respond to a HealthPing. This could include important personal documents, legal papers, or any other sensitive information that might be needed in an emergency.
  • Executing API Calls: For more tech-savvy users or those with specific digital needs, Actions can include triggering an API call. This could integrate with other systems or services, initiating a sequence of events or alerts beyond the HealthPing system itself.
  • Making Files Public: In some scenarios, a user might choose to make certain information publicly accessible if they do not respond to a HealthPing. This could involve sharing a link to a pre-shared Shieldwall URL where the information can be accessed by anyone with link.

Customization, Configuration and Importance of Shieldwall Actions:

  • Personalization: Users can customize each Action based on their anticipated needs, determining what should happen in various scenarios.
  • Conditional Triggers: Actions are only triggered under specific conditions, such as the user not responding to a HealthPing within a predetermined timeframe.
  • Safety and Security: Actions serve as an essential safety measure, ensuring that important steps are taken even if the user is unable to respond due to unforeseen circumstances.
  • Peace of Mind: Knowing that certain Actions will be taken automatically can provide users with peace of mind, especially in situations where their response might be critical.

In conclusion, Actions are a fundamental feature of the HealthPing service, providing automated, user-defined responses that are triggered under specific conditions to ensure safety, security, and the timely sharing of vital information. These customizable responses allow users to plan for various scenarios, ensuring that their personal preferences and safety requirements are met even when they can't respond.

TimeLock is a security feature for Shieldwall accounts designed to enforce a strict configurable lockout period during which access to the account is completely denied. Upon activation:

  • Login Restriction: Users cannot log in to their account. This prevents unauthorized access during the lockout period.
  • Authentication Freeze: Any attempts to reset the password or two-factor authentication (2FA) will be blocked, ensuring the account remains inaccessible.
  • Settings Lock: No modifications to existing account settings can be made. This maintains the integrity and security configuration of the account as it was before the TimeLock was activated.
  • Irreversible Action: Once activated, the TimeLock cannot be reversed, and Shieldwall will not restore account access until the designated lockout period is over.
  • HealthPing Integration: The feature is integrated with HealthPing checks, which are pre-configured monitoring checks. These will continue to operate as scheduled even when the account is locked.
  • Automated Response: If a HealthPing check fails to validate, predefined actions will automatically initiate without any need for user intervention.
  • Immediate Effect: Activating TimeLock results in the user being immediately logged out of the account to enforce the lockout.

The SoL (Sign of Life) service is a feature within the HealthPing system designed to provide controlled visibility of your status updates. This service offers the following functionalities:

  • Customizable Visibility: Users have the flexibility to control who sees their HealthPing status updates. By setting the visibility to public, anyone with the specific link provided by the user can view these updates.
  • Optional Anonymity: The service offers the option to display status updates with or without the corresponding date and time information. This allows users to choose the level of detail they are comfortable sharing.
  • Privacy-Conscious Time Formatting: To further protect user privacy, any displayed time and date information will be in UTC format. This decision is specifically designed to avoid revealing the user's time zone, thereby maintaining a level of anonymity and safety.

Overall, the SoL service empowers users with the ability to share their status updates while maintaining control over their privacy and the amount of information disclosed. It's an integral part of the HealthPing system, ensuring users can stay connected and visible on their terms.

Decrypting a GPG Symmetrically Encrypted File: The process is similar across Linux, Windows, and OSX.

Linux:
  • Install GnuPG (GPG) using your package manager if it's not already installed.
  • Open the terminal, navigate to the directory with the encrypted file.
  • Run the following command:
    gpg --decrypt filename.ext.gpg > outputfile.ext
  • Provide the passphrase when prompted.
Windows:
  • Install Gpg4win for GPG functionalities.
  • Use the Command Prompt or PowerShell to access the file's directory.
  • Execute the following command:
    gpg --decrypt filename.ext.gpg > outputfile.ext
  • Provide the passphrase when prompted.
OSX (macOS):
  • Install GPG using Homebrew or download GPG Suite.
  • Open Terminal and go to the file location.
  • Type the following command:
    gpg --decrypt filename.ext.gpg > outputfile.ext
  • Provide the passphrase when prompted.

Note: The decrypted content will be saved in 'outputfile.ext'. Ensure to type the correct passphrase for successful decryption. You can rename 'outputfile.ext' to any desired filename.

Verifying the SHA256 checksum of a file: This process ensures the integrity of a file you've downloaded. It is slightly different for Linux, Windows, and OSX.

Linux:
  • Open a terminal and navigate to the directory containing your file.
  • Run the following command:
    sha256sum filename
    Replace 'filename' with the name of your file.
Windows:
  • Open Command Prompt and go to the directory of your file.
  • Execute:
    CertUtil -hashfile filename SHA256
    Replace 'filename' with the name of your file.
OSX (macOS):
  • Open Terminal and change to the file's location.
  • Type:
    shasum -a 256 filename
    Replace 'filename' with the name of your file.

Compare the output with the provided SHA256 checksum to ensure file integrity. For more detailed information on SHA-2 (Secure Hash Algorithm 2), a set of cryptographic hash functions, please refer to its Wikipedia page.

Disclaimer

Please note that our platform is currently in its beta phase. During this period, some features may not be available, or their functionality might differ from what will be available in the final release. We are dedicated to improving our services and may make changes to features, functionalities, and interfaces based on user feedback and our development roadmap. We appreciate your understanding and value any feedback you may have regarding your experience. Your input is crucial in helping us enhance the platform for its official launch. Thank you for supporting us during this phase of development.