Terms of Use

These terms govern your use of IOTA Wallet and our services. Please read them carefully to understand your rights and responsibilities as a user.

Last Updated: May 10, 2025

Introduction and Acceptance

These Terms of Service (“Terms”) establish the conditions under which you may download, install, and use IOTA Wallet application. By installing or using the wallet on any supported operating system — Windows, macOS, or Linux — you acknowledge that you have read, understood, and agreed to these Terms in full. If you do not agree with any part of them, you should not use the application.

IOTA Wallet is a non-custodial, open-source software developed to allow users to securely manage digital assets on the IOTA network. It provides a local interface to generate and store private keys, sign transactions, and interact with the Tangle without relying on centralized servers or third-party intermediaries.

These Terms are not a financial or contractual agreement between you and the developers. The wallet does not provide banking, exchange, brokerage, or custodial services. It is a standalone software tool distributed freely under an open-source license, allowing anyone to download, inspect, modify, and use it at their own discretion.

By continuing to use the wallet, you acknowledge that:

  • You are solely responsible for how you install, configure, and operate the software.
  • You understand that the wallet performs all sensitive operations locally and that your seed phrase and private keys remain exclusively under your control.
  • You are aware that the wallet is offered “as is”, with no guarantees of uninterrupted service, compatibility, or performance.

The purpose of this document is to clarify the scope of use, responsibilities, and limitations that apply to all users. It also ensures transparency by describing how the wallet should — and should not — be used within the boundaries of open-source and decentralized principles.

These Terms apply to:

  • The desktop IOTA Wallet software and its distributed packages;
  • Any associated documentation, FAQs, or downloadable updates published through official channels;
  • User interactions with the software’s built-in functions and configurations.

They do not apply to third-party websites, explorers, or nodes you choose to connect to, nor do they extend to any community-managed or external services outside the wallet’s official release.

IOTA Wallet may evolve over time, introducing improvements, new features, or compatibility adjustments. Updated versions of these Terms will accompany each major release to ensure continued clarity. By using any version of the wallet, you confirm your ongoing acceptance of the Terms relevant to that release.

Use of Software

IOTA Wallet is provided as a free, open-source desktop application designed for secure interaction with the IOTA network. It may be used by any individual or organization, provided that such use complies with applicable laws and the principles outlined in these Terms. The software’s open-source nature grants you freedom to install, run, and study its code, but that freedom also carries the responsibility to use it ethically and safely.

Permitted Use

You are allowed to:

  • Install and use the wallet for personal, educational, research, or professional purposes.
  • Create and manage multiple wallet instances on your devices.
  • Review, audit, and compile the source code in accordance with its open-source license.
  • Connect to public or private IOTA nodes of your choosing.
  • Customize local configurations and appearance settings for usability or accessibility reasons.

These actions are considered normal and intended behaviors of the software. You are free to use the wallet in any legitimate way that does not compromise its integrity or the safety of the IOTA network.

Prohibited Use

You agree not to:

  • Use the wallet for any activity that violates laws, regulations, or the rights of others.
  • Deploy or distribute modified versions of the wallet that include malware, telemetry, or unauthorized tracking code.
  • Attempt to reverse engineer, exploit, or compromise the application to gain access to other users’ data or private keys.
  • Use the wallet as part of any automated bot, mining, or spam system targeting the IOTA network.
  • Interfere with network nodes, manipulate transaction validation, or perform denial-of-service attacks.
  • Claim, imply, or advertise that the wallet is an official product of a specific organization unless explicitly authorized.

The wallet was created to promote decentralization and user control. Any modification or redistribution that alters these principles — for example, by adding remote data collection, advertising, or closed-source binaries — violates both the Terms of Service and the open-source license under which the wallet is distributed.

Third-Party Integrations

While the wallet may allow you to connect to third-party services (such as IOTA nodes, hardware wallets, or explorers), those interactions occur outside the control of the wallet developers. You are solely responsible for verifying the authenticity, security, and reliability of such services. The developers do not endorse or guarantee the safety of any third-party component, API, or integration you choose to use.

User Responsibility

Every action performed within the wallet is executed locally under your control. By using this software, you agree to operate it responsibly and not to introduce modifications or behaviors that could harm the wider network or other users. You also agree that you are solely accountable for maintaining the security of your devices, systems, and network connections while using the wallet.

Non-Custodial Nature & User Responsibility

IOTA Wallet is built on a fully non-custodial architecture, meaning all cryptographic materials — private keys, wallet seeds, and encrypted data files — are generated and stored exclusively on your local device. No remote servers or cloud systems are used for key storage or transaction signing. This ensures that full ownership and control remain in the hands of the user, not the developers or any third party.

When a new wallet is created, all sensitive data is produced locally and never transmitted over the network. Every outgoing transaction is signed within the application using your private keys, then broadcast directly to the IOTA network through the node you select. Because there is no central authority managing user credentials, you remain the only person capable of accessing your wallet or restoring it from backup.

This decentralized model provides complete freedom, but also full responsibility. The security of your funds depends entirely on your own device security, password hygiene, and backup practices.

User Responsibility

By using IOTA Wallet, you acknowledge and accept that:

  • You are the sole custodian of your private keys and recovery phrase. Losing them means permanent loss of access to your tokens.
  • Developers have no technical means to restore or recover your wallet, passwords, or seed phrase — no backups or recovery systems exist.
  • You must ensure your device remains free of malware and that your operating system, antivirus, and dependencies are kept up to date.
  • Running the wallet on shared or compromised hardware increases the risk of unauthorized access, and this risk is entirely your responsibility.

If your device is lost, stolen, or corrupted, recovery is only possible through your personal backup. Storing your recovery phrase online or in cloud storage is strongly discouraged, as anyone who obtains it gains complete control over your assets.

Ownership of Assets

All digital assets managed through IOTA Wallet belong exclusively to you. The wallet does not hold, transfer, or escrow tokens on your behalf; it simply provides a local interface to sign and send transactions to the IOTA Tangle. No data about your balances, transaction history, or addresses is collected or transmitted to developers. You decide which nodes to connect to and how to interact with the network.

The wallet is not a financial service, broker, or exchange. It performs no custody, no conversion, and no mediation of funds. All transfers occur directly between network participants, following the immutable logic of the IOTA protocol.

Local Security Practices

Private keys and recovery data are encrypted using strong, modern cryptographic standards.

For maximum safety, users are encouraged to:

  • Keep an offline copy of their recovery phrase written or engraved on a secure medium (paper, metal, etc.).
  • Avoid screenshots, cloud storage, and external drives connected to the internet.
  • Never share wallet data, passwords, or files with any person or third-party service.

IOTA Wallet does not contain telemetry, analytics, or background synchronization that could compromise privacy or security. All critical processes run locally and terminate immediately when the wallet is closed.

User Accountability

All transactions on the IOTA network are final and irreversible. Mistakes such as sending tokens to an incorrect address, deleting wallet data, or losing a recovery phrase cannot be undone. There are no centralized systems to appeal to, no password reset, and no technical recovery option. This is a deliberate design choice — decentralization ensures independence, not reliance on third parties.

By continuing to use the wallet, you agree that you are fully accountable for the security of your wallet, your devices, and your actions within the network. The application empowers you with total control, but that control comes with the responsibility to protect your digital assets at all times.

Disclaimers & Limitation of Liability

IOTA Wallet is distributed as open-source software, provided to users in its current state without any warranties, representations, or guarantees of performance, reliability, or compatibility.

By using the application, you acknowledge that it is offered “as is” and “as available”, with no promise of uninterrupted service, specific feature set, or compatibility with your hardware, operating system, or network configuration.

The developers, contributors, and maintainers make every reasonable effort to ensure stability, security, and accuracy of the wallet, but cannot guarantee that the software will be free from defects, vulnerabilities, or interruptions.

Blockchain environments evolve quickly, and certain behaviors or integrations may change due to protocol updates, node incompatibility, or external dependencies beyond the control of the development team.

No Financial Services or Guarantees

IOTA Wallet is a self-managed tool for accessing the IOTA network. It is not a financial institution, exchange, or broker, and does not provide any investment, custody, or advisory services.

No party associated with the wallet can be held responsible for:

  • Loss of funds due to user error, forgotten passwords, or misplaced recovery phrases.
  • Software or hardware failure, corruption of files, or system incompatibility.
  • Issues caused by connecting to third-party nodes, APIs, or network endpoints.
  • Market losses, token volatility, or external price fluctuations.

The wallet merely provides a graphical interface for users to sign and broadcast transactions — it does not verify, audit, or guarantee the success of any network operation.

Security and Reliability Disclaimer

While security best practices are implemented throughout the codebase, no digital system is immune to risk.

By using IOTA Wallet, you accept that certain external factors — including malware infections, compromised hardware, or operating system vulnerabilities — can impact your wallet’s integrity.

You are responsible for maintaining your device’s security, controlling network access, and ensuring that backups are made in safe and private locations.

The wallet does not perform remote logging or data collection that could compromise privacy, but its interaction with external nodes or explorers depends on your configuration.

These components may have their own risk profiles and must be reviewed independently by the user.

Limitation of Liability

Under no circumstances shall the developers, contributors, or associated entities be liable for:

  • Any loss of data, tokens, or profits, whether direct, indirect, or consequential;
  • Damage resulting from the use or inability to use the software;
  • Losses arising from connection failures, corrupted transactions, or system crashes;
  • Legal or regulatory consequences of using the wallet in your jurisdiction.

This limitation applies to all forms of potential damage — including negligence, misconfiguration, hardware failure, or software defects. By downloading or using the application, you agree that you assume full risk for its operation and outcomes.

Open-Source Disclaimer

As an open-source project, IOTA Wallet may include community contributions. While these undergo review, the development team cannot guarantee the accuracy, performance, or safety of third-party code or modifications distributed by others. Users who compile or modify the software themselves are fully responsible for verifying the trustworthiness and security of those builds.

Updates & Modifications

IOTA Wallet is an evolving software project that undergoes regular updates to maintain compatibility with the IOTA network, improve performance, and enhance user experience.

By installing or using the wallet, you agree that future versions may include modifications to its features, security systems, or user interface, and that these updates can be released without prior notice.

Software Updates

From time to time, new versions of the wallet may be released to:

  • Support protocol upgrades or network changes within IOTA.
  • Patch identified vulnerabilities or improve encryption mechanisms.
  • Optimize transaction handling, synchronization speed, or node connections.
  • Enhance cross-platform stability or visual elements.

These updates are made available through official distribution channels only. Users are strongly encouraged to verify the authenticity of downloaded packages by checking cryptographic signatures or hashes provided on the official site. Installing modified or unofficial versions from untrusted sources poses a security risk that the developers cannot mitigate.

The wallet does not perform automatic updates or remote modifications. All upgrades are initiated manually by the user, ensuring that no background process alters the application without explicit consent.

Changes to Features and Functionality

Over time, certain features may be added, updated, or deprecated. This includes, but is not limited to:

  • Adjustments to node management, staking support, or multi-account handling.
  • Revisions to the user interface or configuration system.
  • Removal of outdated integrations or experimental modules that no longer align with network standards.

Such modifications are part of normal software evolution and do not constitute a breach of these Terms. Users are responsible for keeping their version current to ensure continued access to network functionality and security improvements.

Backward Compatibility

While efforts are made to maintain backward compatibility, newer versions may introduce protocol-level changes that render old versions partially or fully incompatible with the latest IOTA network.

Running outdated versions could lead to issues such as:

  • Delayed or failed synchronization.
  • Inability to broadcast transactions.
  • Reduced stability or performance.

Modifications by Users

IOTA Wallet’s open-source nature allows users to study and modify the codebase.However, any custom build, fork, or altered distribution is considered an independent project and not covered by these Terms.The original maintainers bear no responsibility for the behavior, safety, or performance of modified versions distributed by others.

If you choose to compile or adapt the source code yourself, you must ensure that such actions comply with the open-source license and that your modifications do not misrepresent or endanger the original project.

Discontinuation and Legacy Versions

Developers reserve the right to discontinue support for older builds, networks, or dependencies that are obsolete or insecure.

Archived versions may remain publicly available for transparency, but they are not guaranteed to function reliably or safely. Users who continue to run outdated versions do so entirely at their own risk.