{"version":1,"pages":[{"id":"On3qKggnSElNau44ynGy","title":"Introduction","pathname":"/","siteSpaceId":"sitesp_sPteK","description":"A decentralized framework for digital inheritance — give your crypto a survivable plan, without trusting a centralized custodian."},{"id":"iaml4c4AeK1tJA1xqSB2","title":"User Guide","pathname":"/user-guide","siteSpaceId":"sitesp_sPteK","description":"How to use 10102 Computing Legacy, from connecting your wallet to creating legacies, timelocks, and managing them over time."},{"id":"Tyq5PuIy3ho41eJ9pn7e","title":"Authentication","pathname":"/user-guide/authentication","siteSpaceId":"sitesp_sPteK","description":"Connect and disconnect wallets. We support every common Ethereum wallet via standard connectors — WalletConnect, Ledger, Trezor, MetaMask, and more.","breadcrumbs":[{"label":"User Guide"}]},{"id":"of3y5r7Sg2RcVFzyuCcg","title":"Concepts","pathname":"/user-guide/concepts","siteSpaceId":"sitesp_sPteK","description":"Short definitions of the vocabulary that shows up throughout 10102 Digital Inheritance. Skim this first; come back when a term doesn't click.","breadcrumbs":[{"label":"User Guide"}]},{"id":"oc9huXTrtD4Y4cbh1A7m","title":"Quick Actions","pathname":"/user-guide/quick-actions","siteSpaceId":"sitesp_sPteK","description":"Opinionated shortcuts on the home page that pre-fill a legacy or timelock for a specific goal. All of them drop into the standard flows — you can tweak anything before signing.","breadcrumbs":[{"label":"User Guide"}]},{"id":"Gq4NGnjpu6xImvpD10Lt","title":"Bring your own RPC","pathname":"/user-guide/bring-your-own-rpc","siteSpaceId":"sitesp_sPteK","description":"Route the app's Ethereum reads through your own RPC endpoint instead of the default providers. Useful when the defaults are throttled, when you want privacy from third-party node operators, or when yo","breadcrumbs":[{"label":"User Guide"}]},{"id":"TOfV8QHWRnKOxcvLxPab","title":"Legacy","pathname":"/user-guide/legacy","siteSpaceId":"sitesp_sPteK","description":"Legacy contracts hold the rules for how, when, and to whom your assets pass. Two shapes — Transfer and Multisig — for different inheritance styles.","breadcrumbs":[{"label":"User Guide"}]},{"id":"c7OmY7mv1foe5Hb201Ec","title":"Create a Legacy Contract","pathname":"/user-guide/legacy/create-a-legacy-contract","siteSpaceId":"sitesp_sPteK","description":"Set up a legacy contract so your assets can pass to your beneficiaries on your terms, without a middleman.","breadcrumbs":[{"label":"User Guide"},{"label":"Legacy"}]},{"id":"2LMG5i7nJN21ILjkVqJ7","title":"Legacy Contract Details","pathname":"/user-guide/legacy/legacy-contract-details","siteSpaceId":"sitesp_sPteK","description":"The details page is where you operate a legacy day-to-day: check status, add or remove assets, reset the activation timer, or tear it down.","breadcrumbs":[{"label":"User Guide"},{"label":"Legacy"}]},{"id":"nwLMG5Ns6SdR4zawb0RA","title":"Edit or Delete a Legacy Contract","pathname":"/user-guide/legacy/edit-or-delete-a-legacy-contract","siteSpaceId":"sitesp_sPteK","description":"Change allocations, add or remove beneficiaries, adjust the activation trigger, or tear a legacy down entirely. EOA changes are instant; Safe changes go through your normal Safe threshold.","breadcrumbs":[{"label":"User Guide"},{"label":"Legacy"}]},{"id":"vERMKxltTioJFKe1gMbQ","title":"Activate a Legacy Contract and Claim Funds","pathname":"/user-guide/legacy/activate-a-legacy-contract-and-claim-funds","siteSpaceId":"sitesp_sPteK","description":"Activate an inherited legacy and claim funds. Works through the 10102 app, the Safe platform (for Safe legacies), or directly from any Ethereum interface using the printed Legacy Claim Card.","breadcrumbs":[{"label":"User Guide"},{"label":"Legacy"}]},{"id":"Je5nHtNkq5yHNJoZAIoI","title":"Legacy Claim Card","pathname":"/user-guide/legacy/legacy-claim-card","siteSpaceId":"sitesp_sPteK","description":"A printable one-page summary that gives your beneficiaries everything they need to claim — even if our UI or website ever goes away.","breadcrumbs":[{"label":"User Guide"},{"label":"Legacy"}]},{"id":"Nfutyy6yeeXWfOiwnU6T","title":"Premium Features","pathname":"/user-guide/premium-features","siteSpaceId":"sitesp_sPteK","description":"Optional, time-bound capabilities on top of the free legacy features — contingent beneficiaries, authorized watchers, and email reminders.","breadcrumbs":[{"label":"User Guide"}]},{"id":"6LSP7vIhQawtTrrx8TSc","title":"Manage Contingent Beneficiaries","pathname":"/user-guide/premium-features/manage-contingent-beneficiaries","siteSpaceId":"sitesp_sPteK","description":"Fallback beneficiary layers that activate only if the primary beneficiaries don't claim within a configurable window. Premium only.","breadcrumbs":[{"label":"User Guide"},{"label":"Premium Features"}]},{"id":"26aRu6oTGmMHzWcufYAr","title":"Manage Authorized Watchers","pathname":"/user-guide/premium-features/manage-authorized-watchers","siteSpaceId":"sitesp_sPteK","description":"Read-only accounts you authorize to view a legacy without being able to edit, delete, or alter it. Premium only.","breadcrumbs":[{"label":"User Guide"},{"label":"Premium Features"}]},{"id":"ZQ6Cgiq7Qxw9SJmtAWip","title":"Configure Email Reminders","pathname":"/user-guide/premium-features/configure-email-reminders","siteSpaceId":"sitesp_sPteK","description":"Optional email notifications for the owner and beneficiaries at key events in a legacy's lifecycle. Premium only.","breadcrumbs":[{"label":"User Guide"},{"label":"Premium Features"}]},{"id":"QXsb8aivW7xuceD09U8Q","title":"Timelock","pathname":"/user-guide/timelock","siteSpaceId":"sitesp_sPteK","description":"A time-based security layer for self-custody wallets. Lock your own funds against coercion, wrench attacks, or just your own impulse decisions.","breadcrumbs":[{"label":"User Guide"}]},{"id":"s0VIomso3t2173jqVVQO","title":"Using Timelock","pathname":"/user-guide/timelock/using-timelock","siteSpaceId":"sitesp_sPteK","description":"Creating, managing, and claiming each of the three timelock flavors: Timelock, Soft Timelock, Timelocked Gift.","breadcrumbs":[{"label":"User Guide"},{"label":"Timelock"}]},{"id":"5Kk3UMETmN1odKtZrSjY","title":"Architecture","pathname":"/architecture","siteSpaceId":"sitesp_sPteK","description":"How the whole system fits together: smart contracts on Ethereum, subgraphs on The Graph, and off-chain services for email and activity tracking."},{"id":"3DTXeFjQt1Cmo6TsWpe9","title":"Legacy Contracts Created with Safe SDK","pathname":"/architecture/legacy-contracts-created-with-safe-sdk","siteSpaceId":"sitesp_sPteK","description":"How Safe-owned legacies (Multisig and Transfer) integrate with an existing Safe via Safe Guards and Safe Modules, and how the lifecycle events flow.","breadcrumbs":[{"label":"Architecture"}]},{"id":"CAH9vxvZ1xq96W4NHLMj","title":"Legacy Contracts Created with EOAs","pathname":"/architecture/legacy-contracts-created-with-eoas","siteSpaceId":"sitesp_sPteK","description":"How Transfer legacies work when the owner is a plain EOA (MetaMask, Ledger, Trezor, …) with no Safe involvement, and how CREATE2 makes the setup flow feel less alarming.","breadcrumbs":[{"label":"Architecture"}]},{"id":"G0yjyYwgGtpW8IZOSPgN","title":"New Account Generation for Beneficiaries","pathname":"/architecture/new-account-generation-for-beneficiaries","siteSpaceId":"sitesp_sPteK","description":"How the app generates an Ethereum keypair for a beneficiary who doesn't already have one, entirely in the browser — and why we never see the private key.","breadcrumbs":[{"label":"Architecture"}]},{"id":"WSR3BwVgazMAapVLy157","title":"Indexing & Activity Tracking","pathname":"/architecture/indexing-and-activity-tracking","siteSpaceId":"sitesp_sPteK","description":"Subgraphs on The Graph keep the UI fast; Chainlink Functions + Moralis fill in the one thing the EVM can't tell us — an EOA's last outgoing transaction timestamp.","breadcrumbs":[{"label":"Architecture"}]},{"id":"oOZGl2nm10EwMkEIk96a","title":"Email Reminders","pathname":"/architecture/email-reminders","siteSpaceId":"sitesp_sPteK","description":"How email reminders are driven from on-chain state — Chainlink Automation runs the cron, Chainlink Functions triggers the SMTP call, and the plan keeps working even if email delivery fails.","breadcrumbs":[{"label":"Architecture"}]},{"id":"erZ6d8aifyH06oOe9YgP","title":"Design & Engineering Notes","pathname":"/dev","siteSpaceId":"sitesp_sPteK","description":"The \"why\" behind the harder engineering decisions in 10102 Digital Inheritance — useful for auditors, integrators, and future maintainers."},{"id":"v8GAb7urM7eLOK783XRL","title":"Inactivity Detection","pathname":"/dev/technical-analysis","siteSpaceId":"sitesp_sPteK","description":"The core engineering challenge behind an on-chain inheritance product — and the trade-offs baked into how we solved it.","breadcrumbs":[{"label":"Design & Engineering Notes"}]},{"id":"vVykrmez1QBlzdWATjDy","title":"Core Mechanisms","pathname":"/dev/core-mechanisms","siteSpaceId":"sitesp_sPteK","description":"The moving parts of the system and what each one is responsible for — useful as a mental model before diving into specific contracts.","breadcrumbs":[{"label":"Design & Engineering Notes"}]},{"id":"TSSib6E80Fe4pb4KdKCB","title":"Roadmap","pathname":"/dev/backlog","siteSpaceId":"sitesp_sPteK","description":"What we're working on, what we've decided to defer, and the triggers that would bring deferred items back onto the active list.","breadcrumbs":[{"label":"Design & Engineering Notes"}]}]}