On-Chain Digital Inheritance
A smarter, safer way to ensure your wishes are honored when the time comes.
Why You Need Inheritor
Traditional inheritance solutions are expensive, time-consuming and impractical. Inheritor makes it possible to manage your inheritance from your phone.
No paper work. No notary visits.
No account required. No wallet required.
No private servers. No third party risk.
On-Chain Digital Inheritance
Rather than merely mimicking traditional wills in a digital form, this approach reconceptualizes inheritance through tokenization—creating digital representations of any asset with cryptographically enforced conditional transfer.
Through smart contracts and architectural time-locks, beneficiaries receive provable, conditional access to tokenized assets without requiring custody arrangements or ongoing institutional dependencies.
This system is not limited to cryptocurrencies or digital files. By leveraging tokenization, it securely manages and transfers rights to any asset—real estate deeds, intellectual property, tangible property, or access credentials—through universal blockchain infrastructure.
Inheritor makes it simple, the blockchain makes it bulletproof.
Examples
Make it yours. The blockchain will take care of it. Click on any example to see a sample inheritance letter.
Make sure your family has quick access to your savings.
To my beloved Caroline,
If you are reading this, it means Inheritor has released my inheritance to you. I've prepared everything so that you will have full access to our bank accounts and cards, and can continue managing our household without worry.
What I'm leaving you in this Inheritance is access to our online bank account and debit card.
JB5WYZDPEMHPK3P&P
This card gives you direct access to cash at ATMs and payments in stores.
How to use this:
I wanted to be sure you never faced uncertainty. This inheritance gives you full control, so you can carry on with peace of mind.
With all my love,
Thom
Ensure what is meaningful to you is not lost.
To my beloved Caroline,
If you are reading this, it means Inheritor has released one of several inheritances I prepared for you and the children. Not everything I wished to pass on is financial – I also wanted to leave behind memories, words, and creations that carry my voice into the future.
How I've arranged this:
You will notice in the Claim tab that each inheritance has a short message explaining what it contains. These will not all arrive at once. Instead, they are released gradually, after different time-locks:
Access:
When an inheritance is released:
These inheritances are not just files – they are gifts for different stages of your journey, and for the children's journey too. I arranged them this way so you would not be overwhelmed, and so they arrive at the right time, with the right meaning.
With love always,
Thom
Ensure business continuity.
To my Successor,
If you are reading this, it means Inheritor has released my inheritance to you. I've prepared everything so that you can carry on leading our company without interruption.
What I'm leaving you in this Inheritance is access to the company's core accounts and data.
These credentials will allow you to access our email, repositories, servers, and shared accounts. Inside the vault, you will also find contracts, financial logins, and communication templates.
How to use this:
I built this company with you because I trust you. Now I trust you to continue our work, to protect our team, and to carry the vision forward.
With gratitude and confidence,
Thom
Ensure access to safeguard content.
To my beloved Caroline,
If you are reading this, it means Inheritor has released my inheritance to you. Alongside financial and personal assets, I also wanted to make sure you have access to the social channels and online community I built. These spaces hold memories, connections, and, in some cases, income.
What I'm leaving you in this Inheritance is access to my social accounts.
These details allow you to sign in, post updates, manage communities, or close the accounts when you feel it's right.
How to use this:
Always yours,
Thom
Ensure your keys are not lost forever.
To my beloved Caroline,
If you are reading this, it means Inheritor has released my inheritance to you. I've prepared everything so you will have access to the cryptocurrency I saved for our future.
What I'm leaving you in this Inheritance is access to my private crypto wallet.
abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon aboutHow to use this:
These savings were built with love and care for you. Please use them wisely, and know that in every coin, a part of me remains with you.
Forever yours,
Thom
Safeguard your legacy for the next generation, independent of any institution, forever.
Download the appFrequently Asked Questions
Add the first inheritances to your Digital Will for free to see how it works.
Sufficient for most users
Unlimited use
Inheritor isn't your typical app.
Inheritor makes it possible for anyone with an iPhone to access a smart contract that executes your digital will when something serious happens to you.
Nobody will be able to stop the execution of your digital will exactly as you intended. Not even the end of our company or even Apple, as the distributed blockchain will probably outlive us all. Peer-to-peer, transparent, censorship-resistant, resilient—just as the blockchain was meant to be.
Your legacy is encrypted using quantum-resistant hybrid cryptography and the smart contract ensures that only your designated beneficiary can decrypt it when something happens to you.
The blockchain does the heavy lifting. We just make it simple.
*Patent Pending
How It Works
Your inheritances are protected by quantum-safe encryption and released automatically through smart contracts when the time comes.
Your assets are encrypted on-device with quantum-safe keys and stored permanently on Arweave.
Periodic check-ins reset the grace period timer. No check-in means the inheritance becomes claimable.
When claimable, your beneficiary uses their key to decrypt and access their inheritance.
Dive deeper into the technical architecture and cryptographic foundations