1. Acceptance of Terms
By downloading, installing, or using the Zcash Wallet software (the “Software”), you agree to these Terms. The Software is developed and distributed by our company (“we,” “our,” or “us”). This is a non-custodial, open-source wallet that gives you full control of your private keys and funds. Before using the Software, you are responsible for understanding the principles of self-custody and the risks of managing cryptographic keys.
If you do not agree with these Terms, do not use the Software.
These Terms apply to anyone who uses, installs, compiles, or interacts with the Software or associated website, tools, or documentation. No user accounts are created, no custody of digital assets is provided, and we do not hold or recover private keys under any circumstances.
We may update these Terms to reflect improvements, security updates, network changes, or legal requirements. Continued use of the Software after changes means you accept the updated Terms. If you do not agree with future changes, you must stop using and uninstall the Software.
This Software is a self-custody tool — not a financial service, exchange, broker, or investment platform. You retain full responsibility for your digital assets and wallet credentials at all times.
2. Description of Service
Zcash Wallet is non-custodial, open-source software designed to let you store, send, and receive Zcash (ZEC) while maintaining autonomy over your private keys and transaction privacy. The Software provides tools for interacting with the Zcash network, creating shielded transactions, and managing cryptographic keys securely on your own device — without relying on centralized identity systems or custodial infrastructure.
The core purpose of the Software is to enable private, peer-to-peer digital cash transactions using zero-knowledge cryptography. All wallet keys, transaction data, and balances are generated, encrypted, and stored locally on your device. We do not operate accounts, manage funds, or mediate transactions on your behalf.
What the Software Provides
The Software may include, depending on platform and version:
- Secure generation and local storage of private keys and seed phrases
- Shielded and transparent address support
- Unified address support (UA) and view-only keys
- Private and transparent transaction capabilities
- Local transaction signing
- Blockchain synchronization and note scanning
- Local balance display and transaction history
- Optional encrypted backup tools controlled solely by the user
- Connection to public Zcash nodes or a self-hosted full node
- Optional tools for verifying wallet integrity and data consistency
What the Software Does Not Do
The Software does not:
- Hold custody of your private keys or funds
- Create user accounts or store identifying information
- Recover lost seed phrases or passwords
- Execute transactions on your behalf
- Provide investment, financial, or custodial services
- Monitor, track, or profile user behavior
- Guarantee any specific network performance, price data, or transaction speed
You retain full and exclusive control over your wallet and cryptocurrency. Your ability to access or recover your funds depends solely on your seed phrase, keys, and device security — not on us or any external party.
Use of the Software is at your discretion, and you are responsible for ensuring your device and environment are secure before interacting with Zcash or entering sensitive wallet data.
3. User Responsibilities
By using the Software, you acknowledge and agree that you — and only you — are responsible for securing your wallet, managing your keys, and protecting access to your cryptocurrency. Because the Software is non-custodial, no one (including us) can recover lost keys, reset access, or reverse transactions on your behalf.
Your use of the Software assumes a reasonable level of technical awareness and financial caution. You must take appropriate steps to protect your seed phrase, device, and network environment before conducting transactions.
You are responsible for:
Securing private keys & seed phrases
Storing your seed phrase in a secure, offline location and never sharing it with anyone. Anyone who obtains it can permanently access your funds.
Device security
Ensuring the device you use is free from malware, up to date, and protected with strong passwords or biometric systems.
Backup practices
Creating and safely storing wallet backups. Loss of your keys or backup means loss of access to your funds.
Password hygiene
Using strong, unique passwords and keeping them confidential. We cannot reset or recover your wallet password.
Network safety
Avoiding untrusted networks when broadcasting transactions or restoring wallets. Using VPN or secure connections where appropriate.
Verifying transactions
Carefully reviewing recipient addresses, network fees, and amounts before sending funds. Blockchain transactions are irreversible.
Compliance with laws
Ensuring your use of the Software complies with all applicable laws, regulations, and jurisdiction-specific requirements.
Staying updated
Installing wallet updates when released, as they may include critical security patches or protocol improvements.
You must not:
- Attempt to reverse engineer, exploit, or interfere with the Software or its network connections
- Modify the Software to mislead users or bypass security mechanisms
- Use the Software for unlawful activity, financial deception, or regulatory evasion
Failure to follow appropriate security practices may result in permanent loss of funds. You understand and agree that you bear full responsibility for any such loss.
4. Security & Private Keys
The Software is designed around full user custody of cryptographic keys. Private keys and seed phrases are generated and stored locally on your device, and are never transmitted to us or to any third party through the operation of the wallet. We are unable to access, view, modify, recover, or reset any keys, passwords, wallet files, or recovery phrases associated with your wallet.
You are solely responsible for securing your seed phrase and for ensuring that your device and storage practices are safe from loss, theft, or unauthorized access. The Software does not include any centralized account system, password reset mechanism, or custodial recovery process. Any backup functionality is fully user-controlled, and the security of backups depends entirely on the methods you choose to use.
Cryptocurrency transactions on the Zcash network are final and irreversible once confirmed. By using the Software, you acknowledge that loss of private keys or seed phrases will result in the permanent loss of access to funds, and that no developer, operator, or affiliated party can restore access or reverse transactions.
5. Prohibited Uses
You agree not to use the Software or any related services in any way that violates applicable law, compromises the security of the Zcash network, or harms other users. The wallet is designed to empower personal financial privacy — not to facilitate misuse, exploitation, or unlawful activity. You are solely responsible for ensuring your use of Zcash complies with the laws of your jurisdiction.
You may not attempt to bypass, alter, disable, reverse-engineer, or disrupt any feature of the Software, its cryptographic components, network communication processes, or update mechanisms. Tampering with the wallet, attempting to interfere with network consensus, or exploiting protocol features to gain unauthorized advantage is strictly prohibited.
The privacy technology that powers Zcash protects legitimate users — it does not exempt anyone from legal responsibility. If you use the wallet in a way that introduces risk to the Zcash ecosystem, other users, or the Software provider, access to certain services may be limited or discontinued without prior notice.
Prohibited activities include, but are not limited to:
- Engaging in unlawful activity under applicable local, national, or international regulations
- Using the Software in connection with money laundering, fraud, terrorism financing, or sanction-evasion schemes
- Attempting to exploit vulnerabilities in the Software or Zcash network
- Distributing malware, spyware, or malicious code
- Interfering with network operations, consensus mechanisms, or wallet infrastructure
- Impersonating others or misrepresenting your identity when seeking support
- Attempting to scrape, harvest, or collect user data through the wallet or related services
- Using automated scripts or tools to overload servers, perform attacks, or collect system information
- Attempting unauthorized access to systems, nodes, or infrastructure associated with the project
We do not monitor user activity or analyze private transactions — the wallet is non-custodial and privacy-preserving by design. However, if misuse becomes evident through security reports, legal requests, or abusive behavior toward the ecosystem, we reserve the right to take protective actions consistent with applicable law.
6. Disclaimers and Limitations of Liability
Zcash Wallet is provided on an open-source, non-custodial basis. The Software is offered “as is” and “as available,” with no guarantees of uninterrupted availability, perfect performance, or fitness for any specific purpose. Cryptographic systems, decentralized networks, and blockchain-based tools come with inherent risks — including software bugs, network delays, evolving security threats, and external dependencies beyond our control.
You acknowledge that you use the wallet at your own risk. We do not take custody of your funds, cannot intervene in transactions, and have no ability to reverse, modify, or restore transfers on the Zcash blockchain. Because you alone control your private keys and seed phrase, we cannot recover lost access or compensate for lost funds. Always maintain secure backups and follow best practices for digital asset security.
To the fullest extent permitted by law, we are not responsible for damages resulting from:
- Loss, theft, or compromise of private keys or recovery phrases
- Incorrect transaction details, including wrong recipient addresses
- Network congestion, miner delays, or blockchain reorgs
- Malware, compromised devices, or insecure environments
- Use of modified, unofficial, or outdated versions of the wallet
- Third-party services, exchanges, or infrastructure providers
- Market volatility, price fluctuations, or economic loss
- Data loss due to hardware malfunction or user error
Nothing in this section is intended to limit rights that cannot be waived under applicable law, nor does it restrict legitimate consumer protections where they apply. The wallet is designed to empower financial self-sovereignty — and self-sovereignty includes responsibility for one’s digital assets, security practices, and transaction decisions.
7. Privacy & Data
We believe financial privacy is a fundamental right — not a feature. Zcash Wallet is designed and operated according to a strict privacy-first philosophy. We do not collect personal information that is not necessary for the core functioning and security of the wallet. We do not monitor user activity, track wallet behavior, or analyze individual transactions. We cannot view your balances, addresses, or transaction history, and we do not have the ability to link your identity to your wallet.
Certain technical data may be processed in limited circumstances to maintain performance and security, such as when you explicitly choose to submit logs for troubleshooting, or when basic security metadata is required to protect the service from abuse. All such data is handled with the minimum scope necessary, never sold, never shared for advertising, and never used to build behavioral profiles. Any optional telemetry or diagnostics is disabled by default unless you choose to enable it.
By using Zcash Wallet, you acknowledge that privacy comes from design — not promises. The wallet is built to minimize data exposure at every layer, ensure that sensitive information remains on your device, and eliminate unnecessary trust in servers, intermediaries, or centralized services. Users remain fully in control of their information at all times. For more detail about how we handle data, please refer to our Privacy Policy.
8. Termination
We reserve the right to restrict or discontinue access to parts of our services if we determine that your actions put other users, the network, or our infrastructure at risk. Because Zcash Wallet is a non-custodial software tool and not an account-based service, a “termination” means the disabling of access to hosted services such as update distribution, support resources, or optional connectivity systems — never access to your wallet or funds.
Your wallet, funds, and private keys always remain fully in your control. We cannot disable your ability to use the Zcash network, hold funds, make transactions, export keys, or interact with other Zcash tools. No one, including us, can remotely freeze your wallet or reclaim your assets.
Termination of optional service access may occur in cases such as:
- malicious attempts to compromise the software or network
- automated abuse or denial-of-service activity
- repeated attempts to bypass security protections
- behavior that threatens user privacy, system integrity, or public safety
You may stop using the wallet at any time by uninstalling it or deleting your data. There is no account to close, and no offboarding process — sovereignty over your funds is entirely yours.
9. Governing Law & Regulatory Framework
This software is developed and distributed in accordance with applicable international and regional regulatory frameworks for non-custodial digital asset software. Zcash Wallet does not provide custody, hold user funds, operate accounts, execute transactions on behalf of users, or act as a financial intermediary. As such, it does not constitute a payment service, exchange service, virtual asset service provider (VASP), or financial institution under relevant regulations.
Use of this software may fall under regulatory frameworks including — but not limited to:
- MiCA (Markets in Crypto-Assets Regulation) in the European Union
- FinCEN & FATF guidance on self-hosted wallets and non-custodial technology
- Local digital asset regulations in specific jurisdictions
Under these frameworks, self-custody wallet software is recognized as non-custodial technology, and users remain fully responsible for managing and controlling their private keys and funds.
By using this software, you confirm that its use is permitted in your jurisdiction and that you comply with any laws applicable to you. If local law restricts the use of privacy-preserving cryptographic tools, you must not use the wallet in that region.
Disputes or legal claims arising from use of this software will be governed by the laws of the jurisdiction where the software publisher is established, without regard to conflict-of-law principles.
10. Updates and Changes
We may update the wallet software, documentation, or these Terms from time to time to improve security, maintain compatibility with the Zcash network, or introduce functional enhancements.
When updates to these Terms are made, the revised version will be published through our official distribution channels. Continued use of the wallet after updates are published constitutes acceptance of the revised Terms. If you do not agree with the updated Terms, you must discontinue use and uninstall the software.
Certain security or stability updates may be required for safe operation of the wallet. Users are responsible for installing updates promptly to ensure continued protection and functionality.
Open-source improvements and contributions may be reviewed and incorporated where appropriate, following security review and compliance guidelines.