Law Enforcement Guidelines
Information for authorities on submitting requests while respecting user privacy and due process.
Overview
We respect the rule of law and user privacy. We respond to valid, narrowly tailored requests consistent with applicable law and our policies. Due to our non‑custodial architecture, we often have limited data.
Scope & nature of data
We generally do not hold private keys or custody assets. Records we may have include account metadata, device/session logs, limited billing records where applicable, and support communications. Content and cryptographic secrets are typically stored locally on user devices or encrypted such that we cannot access them.
How to submit a request
Submit requests through official channels and include: the requesting authority, legal basis, requested records with specific time ranges, relevant identifiers (e.g., account email or transaction hash), and your contact details. We may require service via applicable mutual legal assistance treaties (MLATs) for cross‑border matters.
Legal requirements
We require valid and properly scoped legal process (e.g., subpoena, court order, warrant) before disclosing user data, except as required by exigent circumstances permitted by law. We will narrowly construe requests and may seek to limit overbroad demands.
Emergency requests
Where we reasonably believe that disclosure is necessary to prevent imminent harm, and the law permits, we may respond to emergency requests from verified authorities pending formal process. Emergency requests must state the nature of the emergency, specific persons at risk, the data needed, and why normal process is insufficient.
Data preservation
We may preserve relevant records for a limited time upon receiving a valid preservation request while awaiting legal process. Preservation does not create new data we do not have.
Transparency reporting
Subject to law, we may publish periodic transparency reports summarizing the volume and types of requests received, compliance rates, and reasons for rejection or narrowing, without compromising investigations or privacy.
Contact
Authorities should use our official channels listed on the website and provide a verifiable return email and phone number. We do not respond to requests sent to personal accounts.