FOKS: Secure Data Access via Simple Key Hierarchy

2025-07-11

FOKS secures data access using a simple key hierarchy. Base-level keys include user device keys, backup keys, and YubiKeys. Each user has multiple per-user keys (PUKs) whose seed secrets are encrypted with all available base-level keys. Removing a base-level key rotates PUKs. Team keys (PTKs) function similarly, shared among team members (users or sub-teams) and encrypted with member keys. This hierarchy ensures only authorized devices, teams, and users can access data.

Development key management