Trust [audit] 0 mo
0 mo
Donate

The Short Version

Contents

1. Our Privacy Philosophy

Most privacy policies are lists of ways companies could use your data, hedged with promises that they won't. We think that's backwards.

Delete Upon Death is built on a different principle: we've engineered our systems so that we cannot access your data, even if we wanted to, even if we were compelled to.

This is called zero-knowledge architecture. Your files are encrypted on your device before they reach our servers. We never see the encryption keys. We never see your password. We store only encrypted blobs that are mathematically useless without your credentials.

Privacy isn't a policy for us. It's a technical constraint.

2. What We Collect

Here's an honest breakdown of every piece of data we handle:

Data Stored Can We Read It? Purpose
Account ID (hashed username) Yes No — irreversible hash Identify your account
Authentication token (hashed) Yes No — irreversible hash Verify login
Your username (plaintext) No No — never sent to us N/A
Your password (plaintext) No No — never sent to us N/A
Encrypted files Yes No — encrypted client-side Store your data
Encrypted filenames Yes No — encrypted client-side Organize your vault
File sizes Yes Yes Storage quota tracking
Timestamps (upload, access) Yes Yes Dead man's switch, display
Notification address (email/Signal) Optional Minimal — for sending only Check-in reminders
Trusted contact addresses Hashed + encrypted No — encrypted with your key Death verification
Payment information No — processor handles No Process payment
IP address Temporarily Yes — for rate limiting Abuse prevention

3. What We Cannot Access

This is the important part. Due to our zero-knowledge architecture, the following are mathematically impossible for us to access:

If our database were stolen tomorrow, the attacker would get encrypted blobs and hashed identifiers. Without your password, this data is useless.

What this means: If you lose your password, we cannot help you recover your account. This isn't us being difficult — it's proof that the system works. We genuinely cannot access your data.

4. How Our Encryption Works

For transparency, here's how data flows through our system:

// On your device (client-side):

1. You enter username + password
2. Username → hashed (Argon2id) → becomes account_id
3. Password → derived (Argon2id) → becomes master_key
4. Password → derived differently → becomes auth_token
5. Your files → encrypted with master_key (AES-256-GCM)

// Sent to our server:

account_id      ← we store this (can't reverse to username)
auth_token      ← we store a hash of this
encrypted_files ← we store this (can't decrypt)

// Never sent to our server:

username        ← stays on your device
password        ← stays on your device
master_key      ← stays on your device

For full technical details, see our Security Whitepaper.

5. Data Storage & Security

Where Data Is Stored

Your encrypted data is stored on servers located in [jurisdiction]. If you purchase the Geographic Redundancy add-on, a second encrypted copy is stored in [second jurisdiction].

Security Measures

Breach Notification

In the unlikely event of a security breach, we will notify affected users within 72 hours via any notification address on file and post a notice on our website. Remember: even in a breach, your encrypted data remains encrypted.

6. Third Parties

Service Providers We Use

Service Purpose Data Shared
Cloud hosting provider Server infrastructure Encrypted blobs only
Payment processor Handle payments Payment info (not linked to vault)
Email delivery service Send check-in reminders Notification address only

What We Don't Do

7. Law Enforcement & Legal Requests

We respect the rule of law. We also designed our system to protect you even if we're compelled to cooperate with legal requests.

What We Can Provide If Legally Compelled

What We Cannot Provide (Even If Compelled)

Warrant Canary

We maintain a warrant canary — a signed statement updated monthly confirming we have not received any secret court orders or national security letters. If this statement stops updating, assume we've been compromised.

Legal Request Transparency

We publish an annual transparency report detailing the number of legal requests received and how we responded. We will always push back on overly broad requests.

8. Data Retention & Deletion

While You're Alive

Upon Confirmed Death

When our death detection system confirms your passing (through missed check-ins, trusted contact reports, or death registry matches) and the grace period expires:

  1. All encrypted files are permanently deleted
  2. All metadata (encrypted filenames, folder structure) is deleted
  3. All trusted contact information is deleted
  4. Your account record is deleted
  5. Only an anonymized log entry remains (timestamp, file count, bytes deleted)

This deletion is irreversible. That's the point.

If You Delete Your Account

You can delete your account at any time from your vault settings. The deletion process is the same as death-triggered deletion: complete and permanent.

If We Shut Down

If Delete Upon Death ever ceases operations, we will provide at least 12 months notice and open-source our client software so you can export your encrypted data.

9. Your Rights

Depending on your jurisdiction, you may have the following rights:

Access

You can access all your data by logging into your vault. We cannot provide it to you because we can't decrypt it.

Rectification

You can modify your vault contents at any time.

Erasure

You can delete individual files or your entire account at any time. Deletion is permanent and immediate.

Portability

You can download all your files from your vault in their original format.

Objection

We don't process your data for marketing or profiling, so there's nothing to object to.

GDPR, CCPA, and Other Regulations

Our zero-knowledge architecture means we comply with the spirit of privacy regulations by default. We collect minimal data, can't access what we store, and delete everything upon request or death.

10. Cookies & Analytics

Cookies We Use

Cookie Purpose Duration
session_id Keep you logged in Session (until logout/close)
csrf_token Security (prevent cross-site attacks) Session

Cookies We Don't Use

Analytics

We collect minimal, anonymized analytics (page views, general geographic region) using a self-hosted, privacy-respecting solution. This data cannot be linked to individual users.

11. Children's Privacy

Delete Upon Death is not intended for use by anyone under the age of 18. We do not knowingly collect information from children. If you believe a child has created an account, please contact us.

12. Changes to This Policy

We may update this Privacy Policy from time to time. When we do:

Continued use of the service after changes constitutes acceptance of the updated policy.

13. Contact Us

Questions about this Privacy Policy or our privacy practices?

Get in Touch

We're happy to answer questions about how we protect your privacy.

Securely Contact Us