Security and Privacy
Inheritor is build on a Zero-Knowledge Security basis: Your Legacy, Your Control
We are not securing your legacy, you are
Unlike other services that require you to trust their code, their business practices and overall ethics, we built Inheritor on a zero-knowledge security model. This means that we never store, see, or access your data.
There are no centralized records, no identity verification requirements, and no risk of third-party interference. Essentially, Inheritor is just the tool to fully create and control your own inheritance, protected by cryptography and self executing programs rather than people and bureaucracy.
How does that work?
Every asset you upload is encrypted before it even reaches our system, using advanced symmetric-key cryptography. This means that not even Inheritor can read, access, or retrieve your data. Only you—and your designated beneficiary—hold the key. Without it, your information remains completely inaccessible. No one can tamper with it, alter it, or leak it. Security isn’t just an extra feature build on top the service — it’s the core of how Inheritor works. It also means, we hardly get any user data, can't quickly change the app etc. But we happily accept those cons in return for the security it brings.
To ensure seamless execution, inheritance transfers are automated through Ethereum-based smart contracts. Unlike traditional wills, which rely on intermediaries and legal processes, these smart contracts are self-executing, tamper-proof, and completely transparent. Once deployed, they cannot be altered, censored, or blocked by anyone—not even Inheritor. When the time comes, your beneficiary receives access exactly as intended, without delays, human error, or institutional control.
Your encrypted digital assets are stored on Arweave, a decentralized, permanent storage network designed to outlast any single company or entity. Unlike traditional cloud services that rely on central servers, Arweave ensures that your data is always accessible, fully redundant, and immune to deletion. Even if Inheritor ceases to exist, your encrypted files remain secure and retrievable by your designated beneficiary. No single point of failure. No dependence on third parties. No risk of data loss.
True Privacy, No Exceptions
Privacy extends beyond encryption and storage. Inheritor operates on a privacy-first principle—no login connected to your Apple or Google accounts, no cookies or personal data collection, and no behavioral tracking. We don’t monitor your usage, we don’t track your assets, and we don’t retain access logs. Your digital legacy is yours alone. Inheritor is simply the tool that created the service to ensure it is securely passed on.
Your legacy isn’t just important—it’s personal. With Inheritor, it stays that way.
Last updated