This Privacy Policy explains what information HeliumDesktop may collect, how it is used, and how privacy is handled across the website, downloads, and related resources.
We collect only the technical data needed to keep the site and downloads running securely.
We never collect, transmit, or store your private keys, seed phrases, or wallet passwords.
The wallet software operates locally on your machine. You retain full control over your assets.
Communications are kept only as necessary to respond to your specific inquiries or security reports.
This Privacy Policy applies to your interaction with the HeliumDesktop website, software download pages, related technical documentation, release materials, and any direct support-related communications you choose to initiate.
As an independent, community-driven desktop wallet project, our core philosophy is to minimize data collection. We process information only where reasonably necessary to provide access to the software, ensure distribution integrity, and maintain basic site functionality.
Depending on how you interact with our resources, we may collect realistic and limited categories of information:
Because HeliumDesktop is designed as a local-first interface, there are critical pieces of data we absolutely do not collect, transmit, or have the ability to access.
We do not intentionally collect, log, or store your private keys, seed phrases (recovery phrases), wallet passwords, signed transaction secrets, or any data that grants custody over your on-chain assets. We have zero direct control over user wallets.
The HeliumDesktop software operations are intended to function strictly locally on your machine. When you generate a wallet, input a recovery phrase, or sign a transaction, those actions occur within the boundaries of your operating system or connected hardware wallet (e.g., Ledger).
You remain entirely responsible for the secure storage of your own devices, recovery materials, private keys, and signing decisions. Because we do not collect this data, the project maintainers cannot recover lost keys or phrases under any circumstances.
To maintain and improve the website, we may collect limited technical information automatically. This may include your IP address (temporarily for security routing), browser type, OS/device data, page visits, referrer data, and error or performance logs.
This data is utilized in an aggregated or minimal manner. We process it solely to improve site stability, refine documentation clarity, monitor resource allocation, and ensure smooth release distribution.
When you access our download servers or linked repositories, interactions may be logged by hosting providers. These logs are maintained for technical and security purposes, including:
Please note that cryptographic verification files (such as signatures and checksums) and public keys are deliberately published publicly with releases to allow you to verify the integrity of the software.
If you choose to contact the project maintainers via email or a designated contact form (for instance, to report a bug or coordinate a responsible disclosure), we will retain the personal information you voluntarily provide. This typically includes your name, email address, message contents, and any relevant technical or diagnostic details.
We use this information exclusively for responding to your inquiry, providing requested support, maintaining a record of security disclosures, or following up on technical issues.
To operate effectively, the site relies on infrastructure provided by third-party services. These may include hosting providers, content delivery networks (CDNs), analytics platforms, email service providers, and source code repositories (such as GitHub) where release files are hosted.
When you interact with our site or download links, these third parties may process basic networking data under their own respective privacy terms and agreements. We encourage you to review the privacy practices of platforms like GitHub if you download releases directly from their repositories.
We retain collected data only for as long as is reasonably necessary to fulfill the purposes outlined in this policy. This includes maintaining active support dialogues, resolving security reports, ensuring service operations, maintaining documentation, and complying with any necessary legal obligations.
Routine infrastructure logs are typically cycled and deleted on standard server schedules, while security-related communications may be kept longer for historical reference and project safety.
We implement reasonable technical and organizational measures designed to protect the limited information we collect from unauthorized access, alteration, or destruction. We utilize HTTPS encryption across the site and rely on reputable hosting infrastructure.
However, you acknowledge that no method of transmission over the internet, or method of electronic storage, is 100% secure. While we strive to protect information, we cannot guarantee its absolute security.
The HeliumDesktop website is accessible globally. As a result, the information we collect may be processed and stored on servers located in jurisdictions different from your own, such as the United States or the European Union, depending on the routing of our infrastructure providers.
By using the site, you acknowledge that your information may be transferred to and processed in these alternative jurisdictions, which may have different data protection regulations than your country of residence.
Depending on applicable law in your jurisdiction, you may have specific rights regarding personal data processing. This may include the right to request access to, correction of, or deletion of specific personal information you have provided to us (such as support emails), or the right to object to certain processing activities.
To exercise these rights regarding data held directly by the project, please reach out via the contact information provided below.
We may update this Privacy Policy from time to time to reflect changes in project operations, technical infrastructure, or legal requirements. When material revisions are made, we will update the "Last Updated" date at the top of this page.
We encourage you to review this policy periodically to stay informed about how we manage privacy.
If you have questions, concerns, or requests regarding this Privacy Policy or our data practices, please contact the maintainers at:
The software is a non-custodial interface. We have zero ability to access, freeze, or interact with your on-chain assets.
Seed phrases and private keys never leave your device. We do not track or log them under any circumstances.
Website and support data is processed strictly to keep infrastructure running securely and provide necessary user assistance.
Quick, direct answers to common data and security questions.