In this guide
- What makes bitcoin inheritance different
- How bitcoin inheritance fails
- Inheritance models
- What not to do
- A practical inheritance plan
- Executor and heir checklist
- Maintenance and review
What makes bitcoin inheritance different
Most assets are inherited through institutions. If you die with a bank account or real estate, there is a process to transfer control. Bitcoin is different: control is determined by keys, not by names.
Two realities:
- If keys are lost, bitcoin can be lost permanently.
- If keys are revealed too early, bitcoin can be stolen while you are alive.
Good inheritance planning manages this tension across years or decades.
How bitcoin inheritance fails
Failures are rarely dramatic. They are usually mundane and predictable. Understanding these inheritance failure modes is essential to designing plans that work.
Failure mode 1: The secret is unavailable
- No one knows bitcoin exists
- Seed phrase or device is lost, destroyed, or inaccessible
- A passphrase exists but is not recoverable
- A multisig wallet exists but configuration cannot be reconstructed
Failure mode 2: The secret is too available
- Seed phrase stored in a place that becomes accessible to the wrong person
- Seed phrase placed in a will that becomes visible during probate
- Trusted person gains unilateral access earlier than intended
Failure mode 3: The heirs cannot execute
- Heirs do not know what to do with a seed phrase or hardware wallet
- No one can identify which wallet is relevant
- No rehearsal, plan fails under pressure
A good plan reduces these risks without making daily life operationally heavy.
Inheritance models
No universal best model. The right one fits your reality: family situation, technical comfort, privacy preferences, and size of holdings.
| Model | What It Is | When It Works | Main Risk |
|---|---|---|---|
| Single-key self-custody | Hardware wallet + seed phrase backup | Smaller amounts, simple family | Single point of failure |
| Multisig self-custody | 2-of-3 keys stored separately | Larger amounts, need redundancy | Complexity |
| Collaborative custody | You + provider each hold keys | Recovery support needed | Choosing the right partner |
| Custodial inheritance | Institution with beneficiary process | Heirs not prepared for keys | Counterparty risk |
Model A: Simple self-custody (single-key)
Single-key wallet (hardware wallet) with seed phrase backup plus instructions for heirs.
When it works: Smaller amounts, simple family structure, high confidence in documentation and secure storage.
Main risk: Single point of failure (loss, theft, coercion, missing passphrase).
Model B: Multisig (self-custody)
Multisig wallet (e.g., 2-of-3) where multiple keys are required to spend, stored separately.
When it works: Larger amounts, desire for redundancy, ability to manage more moving parts.
Main risk: Complexity. Multisig reduces single-key failures but introduces setup, configuration, and coordination risk.
→ Read: Bitcoin Multisig Guide
Model C: Collaborative custody
Shared-control model where you hold key material and a provider holds another key, with defined recovery support.
When it works: Holders who want strong redundancy and a defined recovery process without giving any single party unilateral control.
Main risk: Choosing the right partner and understanding withdrawal and recovery process.
Model D: Custodial inheritance
Bitcoin held with a custody institution that has beneficiary designation and a documented inheritance process.
When it works: Heirs are not prepared to manage keys, or you prefer administrative continuity and professional process.
Main risk: Counterparty risk. The institution must remain reliable and honor succession processes over time.
→ Learn about succession planning → Read: What Breaks Custody
What not to do
- Do not put a seed phrase in a will. Wills can become visible during probate. The seed phrase is a master key.
- Do not rely on memory alone. If a passphrase exists, it must be recoverable even if you are incapacitated.
- Do not build a plan no one can execute. A perfect plan in theory is useless if heirs cannot follow it.
- Do not assume custodial access is permanent. Policies and institutions change. Exitability matters.
→ Read: Exitability, Withdrawals, and Finality
A practical inheritance plan
You can build a solid plan without publishing secrets or creating a fragile system.
Step 1: Choose a model you will maintain
Aim for the simplest model that meets your risk needs. Over decades, complexity fails through drift: hardware changes, people move, procedures are forgotten.
Step 2: Separate "instructions" from "secrets"
Inheritance planning needs two separate artifacts:
- Instructions document: what exists, where to look, who to contact, order of operations.
- Secrets: seed phrases, keys, devices, passphrases.
Keep these separate. Instructions should help the right person find the secrets without becoming the secrets.
Step 3: Define roles in advance
- Executor or responsible person: coordinates the process. See bitcoin executor.
- Technical helper (optional): assists with wallet recovery and signing
- Beneficiaries: who ultimately receives the bitcoin. See heir access.
Same person can play multiple roles, but avoid giving one person unilateral access if that is not your intent.
Step 4: Make the "first hour" easy
After a death, the first failure is often simple confusion. Your plan should answer:
- Where are the instructions stored?
- What is the location of backups and devices?
- What do heirs do first, and what should they avoid doing?
Step 5: Plan for incapacity, not only death
Many failures happen during incapacity: illness, travel, cognitive decline. If you cannot act, who can initiate the process, and under what safeguards?
Step 6: Test the plan
A plan that has never been tested is only a story.
At least once, simulate recovery with a small amount or test wallet:
- Can the responsible person find the instructions?
- Can they locate the right materials?
- Can they follow the steps without improvisation?
Executor and heir checklist
For the holder (setup checklist)
- Document what you hold (custodial accounts, self-custody wallets, multisig vaults)
- Document where instructions live and who can access them
- Ensure backups are durable and geographically resilient
- Ensure any passphrase is recoverable under your chosen model
- If multisig, store wallet configuration information needed for reconstruction
- If custodian, confirm beneficiary designation and documented succession process
- Ensure withdrawal path is real and tested periodically
For the executor (action checklist)
- Locate and secure the instructions document
- Identify whether holdings are self-custodied, custodial, or both
- Avoid photographing or copying secrets into insecure devices or cloud storage
- If custodial, request succession process and required documentation early
- If self-custodied, recover a small test amount first if process is unfamiliar
- Verify on-chain settlement when withdrawing to beneficiary addresses
→ Read: Bitcoin Withdrawals Guide → Read: Bitcoin Security Guide
Maintenance and review
Long-term plans fail when not maintained.
At least annually:
- Confirm backups are accessible and readable
- Confirm devices work and are not obsolete
- Confirm contact information for professionals or providers is current
- Confirm family and beneficiary details reflect reality
- Re-test a simple recovery flow if circumstances changed
Good custody is not a one-time setup. It is a relationship with time.
→ Read: Continuity as a Product
Further sources
- Uniform Law Commission: Fiduciary Access to Digital Assets Act (RUFADAA). Legal baseline for fiduciary access in the U.S.
- IRS Notice 2014-21 (PDF). U.S. tax treatment of virtual currency.
- BIP39: Mnemonic code for generating deterministic keys. The seed phrase standard.