INHERITOR
Inheritor website
Inheritor
Inheritor
  • < BACK TO INHERITOR.APP
  • Help Center
    • Quick start guide
    • Back-up solutions
    • Pricing
  • Definitions
  • Emergency tools
  • Frequently Asked Questions
    • Frequently Asked Questions
  • Guides
    • Create your Digital Will
    • Is a Digital Will legal?
    • Bitcoin inheritance protocols
    • Blockchain vs Cloud storage
    • Security and Privacy
  • About us
    • Join our beta group
    • Who we are
    • Inheritor White Paper
    • Privacy policy
    • Terms & conditions
Powered by GitBook

©2025 Copyright Inheritor BV. All Rights Reserved.

On this page
  • We are not securing your legacy, you are
  • How does that work?
  • True Privacy, No Exceptions
  1. Guides

Security and Privacy

Inheritor is build on a Zero-Knowledge Security basis: Your Legacy, Your Control

We are not securing your legacy, you are

Unlike other services that require you to trust their code, their business practices and overall ethics, we built Inheritor on a zero-knowledge security model. This means that we never store, see, or access your data.

There are no centralized records, no identity verification requirements, and no risk of third-party interference. Essentially, Inheritor is just the tool to fully create and control your own inheritance, protected by cryptography and self executing programs rather than people and bureaucracy.

How does that work?

Every asset you upload is encrypted before it even reaches our system, using advanced symmetric-key cryptography. This means that not even Inheritor can read, access, or retrieve your data. Only you—and your designated beneficiary—hold the key. Without it, your information remains completely inaccessible. No one can tamper with it, alter it, or leak it. Security isn’t just an extra feature build on top the service — it’s the core of how Inheritor works. It also means, we hardly get any user data, can't quickly change the app etc. But we happily accept those cons in return for the security it brings.

To ensure seamless execution, inheritance transfers are automated through Ethereum-based smart contracts. Unlike traditional wills, which rely on intermediaries and legal processes, these smart contracts are self-executing, tamper-proof, and completely transparent. Once deployed, they cannot be altered, censored, or blocked by anyone—not even Inheritor. When the time comes, your beneficiary receives access exactly as intended, without delays, human error, or institutional control.

Your encrypted digital assets are stored on Arweave, a decentralized, permanent storage network designed to outlast any single company or entity. Unlike traditional cloud services that rely on central servers, Arweave ensures that your data is always accessible, fully redundant, and immune to deletion. Even if Inheritor ceases to exist, your encrypted files remain secure and retrievable by your designated beneficiary. No single point of failure. No dependence on third parties. No risk of data loss.

True Privacy, No Exceptions

Privacy extends beyond encryption and storage. Inheritor operates on a privacy-first principle—no login connected to your Apple or Google accounts, no cookies or personal data collection, and no behavioral tracking. We don’t monitor your usage, we don’t track your assets, and we don’t retain access logs. Your digital legacy is yours alone. Inheritor is simply the tool that created the service to ensure it is securely passed on.

Your legacy isn’t just important—it’s personal. With Inheritor, it stays that way.

PreviousBlockchain vs Cloud storageNextJoin our beta group

Last updated 4 months ago