Privacy Policy
Last Updated: December 20, 2025
Our Privacy Philosophy
Inheritor is built on a foundation of self-custody and absolute privacy. Our guiding principle is simple: You are in control. We cannot access, view, or decrypt your data because we are architecturally prevented from doing so. Your encrypted inheritances are stored on a public, decentralized network (Arweave), but only you and your designated beneficiaries hold the encryption keys.
Information We Do Not Collect
We do not collect, store, or have access to any of your personal information or sensitive data, including:
- Your name, email address, or any other contact information
- Your cryptocurrency private keys, seed phrases, or passwords
- Your quantum-safe encryption keys (X-Wing or ML-KEM-768)
- The contents of your encrypted inheritances stored on Arweave
- Your device's location or unique device identifiers
- Information about your beneficiaries
How Your Data Is Secured
Security is not an afterthought; it is our entire product. We combine multiple layers of industry-leading technology to protect your digital inheritances.
On-Device Encryption Key Management
Your quantum-safe encryption keys (X-Wing ML-KEM) are generated and stored exclusively within the secure hardware of your iOS device (Apple Keychain and Secure Enclave). We never see them, and they never leave your device unless you explicitly export them.
Quantum-Resistant Encryption
All inheritance data is encrypted on your device using X-Wing (ML-KEM-768-based post-quantum encryption) combined with AES-256-GCM authenticated encryption. Only you, with your encryption keys, can decrypt this information.
Permanent Distributed Storage (Arweave)
Encrypted data is uploaded to Arweave, a decentralized permanent storage network. Your encrypted inheritances are publicly viewable but cryptographically impossible to decrypt without your keys. This ensures permanence, immutability, and accessibility even if Inheritor ceases to exist.
Smart Contract Security (Ethereum/Arbitrum)
Inheritance state management operates through audited smart contracts on Ethereum or Arbitrum. These contracts enforce conditional access rules transparently and immutably on public blockchain infrastructure.
Transparency and Pseudonymity
Inheritor embraces radical transparency. Everything stored on the Arweave network and blockchain is publicly visible—but designed to be pseudonymous and cryptographically secure.
What Is Publicly Visible
- The encrypted ciphertext (your inheritance data in encrypted form)
- Smart contract state (inheritance designated, claimable, or claimed)
- Transaction metadata (transaction IDs, timestamps)
- Encryption algorithm used (X-Wing ML-KEM)
Why This Transparency Is Safe
Pseudonymity: Data cannot be linked to your real-world identity. No email, name, phone number, or other personally identifiable information is stored.
Cryptographic Protection: Your inheritance contents are cryptographically protected within the ciphertext and impossible to decrypt without your quantum-safe encryption keys.
Third-Party Services
Arweave Network: Encrypted inheritances are stored on the decentralized Arweave network. Arweave nodes cannot decrypt your data.
Ethereum/Arbitrum Networks: Smart contract transactions are processed on public blockchain networks.
Apple Services: If you enable iCloud Keychain, your encryption keys sync via Apple's iCloud service, subject to Apple's privacy policy.
No Marketing or Advertising: We do not share data with third-party marketers. Inheritor operates without analytics servers, user tracking, or behavioral profiling.
Contact Us
If you have any questions about this Privacy Policy or our security practices, please reach out:
Inheritor BV
info@inheritor.app