Unlimited Invitations
FREE FOR ALL USERS
Secure contact management with cryptographically signed invitation tokens and verified email delivery. No artificial limits.
Military-Grade Security. Zero-Knowledge Architecture. Complete Transparency.
Every single component part has been built with enterprise-grade infrastructure and military-level encryption with privacy-first principles in mind.
Easy sign-up with 26 oAuth services like Apple, Google, Spotify, Twitter, Microsoft, and Web3 Wallets (Coinbase, MetaMask, OKX) all with Enterprise Security.
AES-256 encrypted messages stored with zero-knowledge architecture. Rich text editor with 11 professional templates, all protected by military-grade encryption.
Enterprise message queue with API status verification, retry logic, and comprehensive audit trails. Every action logged with cryptographic timestamps.
Database-level Row Level Security (RLS) policies ensure complete data isolation. Distributed locking prevents race conditions and maintains data integrity.
FREE FOR ALL USERS
Secure contact management with cryptographically signed invitation tokens and verified email delivery. No artificial limits.
PREMIUM FEATURE
Free: Select 1 recipient
Paid: Unlimited recipients
Control & Safety: Only contacts you explicitly select will receive your death note. This prevents accidental delivery and ensures your final message reaches only those you intend.
Row Level Security ensures complete data isolation. Every step is logged with immutable audit trails and cryptographic timestamp verification for transparency and accountability.
Your scheduled check-in period expires without confirmation.
We immediately send you an urgent notification to check-in.
A final urgent reminder is sent giving you one last chance to check-in.
Your account status changes to expired, triggering the delivery process.
Your final messages are delivered to contacts you've specifically selected to receive them.
A respectful memorial page is automatically created for you to honor your memory. Sensitive information is NEVER shared publicly.
Every action is recorded with timestamps for complete transparency and peace of mind.
Important: You have a grace period after missing your initial deadline. Simply click the verification button or link in any warning email to instantly reset your timer and keep your messages private.
Multi-layered defense-in-depth security with 20 distinct protection mechanisms, continuous monitoring, and industry-leading compliance certifications.
Independently audited compliance with SOC2 Type II standards covering security, availability, and confidentiality. Regular penetration testing and vulnerability assessments.
Military-grade AES-256 encryption with secure key management. TLS 1.3 for data in transit, encrypted at rest with automatic key rotation and hardware security modules.
Full compliance with international privacy laws. Your data rights are protected and respected. Export at any time.
True zero-knowledge architecture with client-side encryption keys. Even our administrators cannot decrypt or access your message content. Cryptographic proof of privacy.
OAuth 2.0 & OpenID Connect
25 providers: OAuth (Atlassian, Bitbucket, Box, Coinbase, Discord, Dropbox, GitHub, GitLab, Google, HubSpot, Hugging Face, LINE, Linear, LinkedIn, Microsoft, Notion, Slack, Spotify, Twitch, X/Twitter, Xero) + Web3 (MetaMask, OKX Wallet, Base, Coinbase Wallet)
Multi-Factor Authentication (MFA)
TOTP, SMS, and authenticator app support
JWT Token Management
Secure token rotation and refresh mechanisms
Single Sign-On (SSO)
Enterprise SAML and social provider integration
Session Security
Secure cookies, CSRF protection, session timeout
Account Recovery
Secure password reset with time-limited tokens
AES-256-GCM Encryption
Military-grade encryption at rest
TLS 1.3 Transport Security
Latest encryption for data in transit
Zero-Knowledge Architecture
End-to-end encryption with client-side keys
Key Management Service (KMS)
Hardware security modules with key rotation
Database Field Encryption
Column-level encryption for sensitive data
Encrypted Backups
Automated encrypted backup with secure storage
Web Application Firewall (WAF)
Protection against OWASP Top 10 threats
DDoS Protection
Multi-layer distributed denial of service defense
Global CDN
Anycast network with 200+ edge locations
Private Network Isolation
VPC with private subnets and security groups
Rate Limiting
API throttling and brute-force protection
IP Allowlisting
Geographic and IP-based access controls
The creators of DeathNote use this platform for their own final messages. We built it for ourselves with the highest standards. We know you can trust it too.
Row Level Security (RLS)
Database-enforced data isolation per user
SQL Injection Prevention
Parameterized queries and input validation
XSS Protection
Content Security Policy and output encoding
CORS Configuration
Strict cross-origin resource sharing policies
Input Sanitization
Server-side validation and data sanitization
Distributed Locking
Prevents race conditions and data corruption
24/7 Security Monitoring
Real-time threat detection and alerting
Immutable Audit Logs
Cryptographically signed activity logging
Intrusion Detection System
Anomaly detection and automated response
Vulnerability Scanning
Automated security assessment and patching
Penetration Testing
Regular third-party security assessments
Incident Response Plan
24-hour response team and recovery procedures
Financial Data Protection
Credit cards, bank accounts, crypto wallets completely filtered
Health Information (PHI)
Medical records, prescriptions, diagnoses protected
Personal Identifiers
SSNs, addresses, phone numbers, emails masked or removed
Legal & Government Data
Court cases, military IDs, immigration documents filtered
Authentication Credentials
Passwords, API keys, tokens never displayed publicly
Smart Masking Techniques
Show last 4 digits of cards, partial dates, privacy domains
Your trust is our foundation. Learn about our commitment to protecting your most personal messages.
DeathNote is not a legal document and is not a replacement for legally binding contracts, wills, or estate planning documents.
Our service allows users to store messages that are automatically shared if check-ins are missed. Paid subscriptions enable additional features.
Users are responsible for maintaining accurate contact information and responding to check-in emails.
We collect only essential information: email addresses, names, and message content. No unnecessary personal data is stored.
All messages are encrypted and stored securely. Access is strictly limited to automated systems and essential maintenance only.
Users may delete their accounts and all associated data at any time. This cannot be reversed.
Choose from 26 authentication methods including OAuth platforms and Web3 wallets for instant, secure authentication. No extra passwords to remember.
Plus magic links for email-based authentication and Web3 wallet connections. All methods secured with enterprise-grade encryption.
Free to start, with optional paid features.
We build an opt-in Memorial Page for you.

Our opinionated mascot who likes 🍎s.
Grumps' memorial page showcases how DeathNote's rich text editor lets you create beautiful, personalized final messages with colors, formatting, images, and meaningful content that truly reflects your personality and wishes.
Complete guide to digital wills, posthumous messaging, afterlife communications, final message delivery, and secure digital legacy planning. Learn how DeathNote protects your final thoughts with enterprise-grade security.
Join thousands who trust DeathNote with their most important messages. Start with our free plan or upgrade for advanced features.
Free. Forever. Always.