Privacy

monero-web is a non-custodial wallet. We do not collect, store, or transmit anything that could be used to identify you, recover your funds, or link you to your Monero activity.

The short version: we have no servers that hold your data, no analytics, no cookies, no trackers, no email signup, no account, no logs we can hand over to anyone — because none of that exists.

What we do not collect

What the wallet does send over the network

The dashboard makes a small number of read-only RPC calls to public Monero remote nodes through a same-origin proxy at /api/proxy. Specifically:

None of these calls include your address, your view key, or any other information that could identify you or your wallet. The proxy forwards them to one of three public Monero remote nodes (Cake Wallet, MoneroDevs, Triplebit) and returns the response. No request is logged on our side.

You can also configure a custom node URL in the dashboard settings. When set, RPC calls go directly to your own node instead of through our proxy — if you run your own monerod, monero-web sees zero network traffic of yours at all.

What Cloudflare can see

monero-web.com is hosted on Cloudflare Pages and sits behind Cloudflare's CDN. As with any CDN, Cloudflare's edge servers see:

None of the information that flows through Cloudflare contains your seed, your keys, or your wallet contents. It is exactly the same set of information any visit to any website on the public internet exposes.

If your threat model requires hiding even the fact that you visited monero-web.com, route your browser through Tor Browser. The site works fine over Tor — there are no captchas, no JavaScript that breaks under Tor, and no server-side checks that block .onion-style traffic.

Sessions and storage

When you derive a wallet, the resulting keys are stored in your browser's sessionStorage — which means they live only in the current tab and are wiped automatically when you close it. You can also set an optional session password; if you do, your keys are AES-GCM encrypted in sessionStorage using a key derived from that password (PBKDF2-SHA256, 250 000 iterations) and decrypted only on demand.

The wallet has an idle auto-lock that fires after 10 minutes of inactivity. With a session password set, locking only wipes the in-memory keys — you can re-unlock by re-entering the password without re-deriving from your seed. Without a password, locking wipes everything and bounces you back to the seed entry screen.

Third parties

The site itself loads from one origin only: monero-web.com (served by Cloudflare). It does not load any external JavaScript, fonts, analytics scripts, or images. Specifically:

For the curious

Everything described here can be verified by reading the source code on GitHub or by opening DevTools → Network on any page of monero-web.com and watching exactly which requests are made. The full security and threat model is documented in the README and the disclosure policy is in SECURITY.md.

Changes to this page

If anything on this page changes, the change will be visible in the git history of privacy.html in the public repository. There is no other notification mechanism because there is no mailing list and no user accounts.