In this guide
- What multisig actually is
- Why multisig matters
- Common configurations
- The hidden complexity
- Setting up multisig properly
- Backup and recovery
- Spending from multisig
- Collaborative custody
- When multisig is wrong
- Maintaining multisig over time
What multisig actually is
Multi-signature is a bitcoin feature that requires multiple private keys to authorize a transaction. Instead of one key controlling funds, a multisig wallet is governed by a set of keys with a defined threshold.
The notation
Multisig configurations are "m-of-n": n is the total number of keys, m is the minimum required to sign.
A 2-of-3 multisig has three keys total; any two can authorize spending. A 3-of-5 has five keys, requiring three signatures.
How it works
When you create a multisig wallet, you create a bitcoin address that encodes the rules: which public keys are involved and how many signatures are required. The bitcoin network enforces these rules. A transaction is only valid if it includes the required number of signatures.
This enforcement is at the protocol level. No one can bypass the threshold: not the wallet software, not any single keyholder, not any institution. The rules are embedded in the address itself.
What multisig is not
- Not two-factor authentication. 2FA protects account access. Multisig protects the bitcoin itself.
- Not a backup scheme. Multisig is about authorization, not redundancy (though it provides both).
- Not magic security. Multisig shifts the attack surface but doesn't eliminate it. Poor setup can make things worse.
Why multisig matters
Single-key storage has a fundamental problem: whoever controls that one key controls everything.
Eliminating single points of failure
A single point of failure is any component whose failure alone results in loss. With a single key:
- If the key is stolen, all bitcoin is gone.
- If the key is lost, all bitcoin is inaccessible.
- If one person is coerced, they can be forced to hand over everything.
With 2-of-3 multisig:
- One stolen key is not enough to steal funds.
- One lost key does not lock you out.
- Coercing one person does not grant access.
The math changes from "one failure = total loss" to "multiple independent failures required."
Requiring coordination
Multisig can enforce that no single person acts alone:
- Business treasury. Multiple executives must approve large transactions.
- Family holdings. Prevents any one family member from unilaterally moving funds.
- Personal discipline. Makes impulsive decisions harder by requiring coordination.
Geographic distribution
Keys can be stored in different locations, even different countries. This protects against:
- Regional disasters (fire, flood, earthquake)
- Jurisdictional risk (seizure, legal action in one country)
- Physical theft (a burglar can only access one location)
A 2-of-3 with keys in three countries means no single government, disaster, or thief can compromise the funds.
Common configurations
| Configuration | Keys Required | Best For | Redundancy | Complexity |
|---|---|---|---|---|
| 2-of-3 | 2 of 3 | Standard for most holders | Can lose 1 key | Medium |
| 3-of-5 | 3 of 5 | Very large amounts, organizations | Can lose 2 keys | High |
| 2-of-2 | Both | Joint accounts, mandatory coordination | None | Medium |
| Collaborative | 2-of-3 with provider | Recovery support, inheritance | Provider assists | Medium |
2-of-3: The standard
Two of three keys required. It is the most common configuration for good reason:
- Redundancy. Lose one key, still have access.
- Security. One compromised key is not enough to steal funds.
- Practicality. Only two signatures needed for routine transactions.
Typical distribution:
- Key 1: Primary signing device (hardware wallet)
- Key 2: Backup signing device (different hardware wallet, different location)
- Key 3: Emergency recovery key (secure offsite storage, or held by a trusted party)
3-of-5: Maximum redundancy
Three of five keys required. More complex, but more resilient:
- Can lose two keys and still recover
- Can have two keys compromised without loss
- Allows broader distribution across locations and people
This makes sense for very large amounts or organizations with multiple stakeholders.
2-of-2: Mandatory coordination
Both keys required for every transaction. No redundancy.
- Neither party can act alone.
- Loss of either key means loss of funds.
- Every transaction requires both parties to coordinate.
Use cases:
- Joint accounts where both parties must agree
- Situations where preventing unilateral action matters more than redundancy
Collaborative custody
Collaborative custody involves a third party holding one or more keys:
- You hold two keys and a provider holds one. You can always act without the provider, but the provider can assist with recovery.
The hidden complexity
Multisig is conceptually simple but operationally complex. Most failures are maintenance failures: missing documentation, lost configuration data, and recovery paths no one has practiced.
More keys, more problems
Each key needs:
- Secure generation
- Secure storage
- Backup procedures
- Regular verification
- Succession planning
With 2-of-3, you have three times the key management of single-key. With 3-of-5, five times. This is not just setup work. It is ongoing operational burden.
The wallet configuration problem
Unlike single-key wallets, multisig wallets need additional information to reconstruct: which public keys are involved, the threshold (m-of-n), the derivation paths, and the script type.
This configuration data is separate from the keys. Lose the configuration, and you may not be able to spend even if you have all the keys.
This is the most common multisig failure mode. People back up seed phrases meticulously but forget the wallet configuration file. Years later, they can't reconstruct the wallet.
Coordination overhead
Every transaction requires coordinating multiple signatures:
- Move one signing device to another location, or
- Transfer partially-signed transactions between devices, or
- Use software that coordinates signing across parties
For long-term cold storage with rare withdrawals, this is manageable. For frequent transactions, the overhead is significant.
Software dependency
Multisig requires wallet software that supports it. Not all wallets do.
If your wallet software disappears or becomes incompatible, you need alternative software that can work with your setup. Choose software that:
- Is open source (auditable)
- Has been used reliably for years
- Supports your hardware wallets
- Allows export of wallet configuration in standard formats
Setting up multisig properly
A multisig setup is only as secure as its weakest point.
Key generation
Each key should be generated independently on a dedicated device:
- Use hardware wallets. Different manufacturers for different keys adds defense in depth.
- Generate offline. Not connected to the internet.
- Verify randomness. Use devices with verified random number generation.
- Independent generation. Don't derive multiple keys from a single seed.
Device selection
For a 2-of-3, consider using different hardware wallet brands. This:
- Reduces risk from firmware vulnerabilities in any single manufacturer
- Ensures you're not dependent on one company's continued operation
- Provides defense in depth
Practical guidance:
- Prefer independent vendors (avoid three devices from the same manufacturer).
- Prefer devices with a strong track record and a verification flow you will actually use.
- Prefer software and hardware that make it easy to export a standard wallet descriptor and re-import elsewhere.
Creating the wallet
- Export extended public keys (xpubs) from each device
- Use multisig-capable software to create the wallet
- Verify the resulting address on each hardware device
- Send a small test amount
- Practice spending before depositing significant funds
Critical: Each hardware wallet should independently verify the multisig configuration. Don't trust software alone. Confirm addresses match on each device's screen.
Software options
Several applications support multisig well:
- Sparrow Wallet (desktop, excellent multisig support, connects to your own node)
- Electrum (long-standing, multisig capable)
- Specter Desktop (designed for multisig with hardware wallets)
- Nunchuk (mobile-friendly coordination)
Choose open source software that has been reliable for years, supports your hardware, and allows configuration export in standard formats.
Backup and recovery
Backup for multisig is more complex than single-key. You're backing up multiple things, and they all matter.
What to back up
1. Seed phrases for each key
- Written on paper or stamped in steel
- Stored in separate, secure locations
- Never stored digitally or photographed
2. Wallet configuration file
This is the critical piece most people miss. Back up:
- The wallet descriptor or configuration file
- The extended public keys (xpubs) for all keys in the setup
- The derivation paths used
- The script type (P2SH, P2WSH, etc.)
Without this, you cannot reconstruct the wallet addresses even with all seed phrases.
3. Instructions for reconstruction
Document how to rebuild the wallet:
- What software was used
- What hardware wallets were used
- Where keys are stored
- Step-by-step reconstruction process
Backup locations
For 2-of-3:
- Key 1 backup: Location A (e.g., home safe)
- Key 2 backup: Location B (e.g., bank safe deposit box)
- Key 3 backup: Location C (e.g., trusted family member, attorney)
Store wallet configuration with at least two key backups. The configuration is not secret (it contains public keys, not private), but losing it is catastrophic.
Testing recovery
Before relying on multisig for significant funds:
- Create the setup with test amounts
- Simulate losing one key (can you still spend with the remaining two?)
- Reconstruct the wallet from backups (do the addresses match?)
- Verify documentation is complete enough for someone else to follow
A backup you've never tested is a story, not a backup.
Spending from multisig
Using multisig is more involved than single-key.
The signing process
To spend from 2-of-3 multisig:
- Create transaction. Specify recipient, amount, fee. Creates unsigned transaction template.
- First signature. Sign with one hardware wallet.
- Second signature. Sign with a different hardware wallet.
- Broadcast. Send completed transaction to the network.
The partially-signed transaction (PSBT) transfers between devices via SD card, USB, QR codes, or file transfer.
Practical considerations
Co-located keys: Sign with one device, then the other, then broadcast. Straightforward.
Distributed keys: Either travel to each location, transfer PSBT electronically via secure channel, or use collaborative custody software that coordinates remotely.
For long-term cold storage with rare withdrawals, traveling to sign is acceptable. For more frequent access, you need a coordination method.
Verify before signing
With multisig, verification is even more important. Verify recipient address and amount on each hardware wallet screen. Don't trust the computer screen alone.
Collaborative custody
Collaborative custody sits between full self-custody and delegating to a custodian. You maintain meaningful control while gaining operational support.
How it works
Typical setup: 2-of-3 where you hold Key 1 (primary) and Key 2 (backup, different location), and a service provider holds Key 3.
You can always spend without the provider (using your two keys). The provider cannot spend without you. But the provider can:
- Assist with recovery if you lose one key
- Provide a second signature if you choose to involve them
- Offer inheritance support through their key
Benefits
- Recovery safety net. Lose one key, provider can help recover.
- Inheritance support. Provider participates in succession processes.
- No single point of failure. Neither party has unilateral control.
- Maintained sovereignty. You can always exit without provider cooperation.
Tradeoffs
- Privacy. Provider knows your transaction history.
- Dependency. For recovery, you depend on provider remaining operational.
- Cost. Providers charge for this service.
Evaluating providers
Ask:
- Can you always spend without them?
- What happens if they go out of business?
- What information do they have access to?
- What is their security model for the key they hold?
- What are the inheritance and recovery procedures?
→ Read: How to Choose a Bitcoin Custody Provider
When multisig is wrong
Multisig is not always the answer. Sometimes it adds complexity without proportionate benefit.
For small amounts
If the amount doesn't justify operational overhead, single-key with a good backup is simpler and sufficient. Rough heuristic: if losing the bitcoin would be inconvenient but not life-changing, simple self-custody may be fine.
When you can't maintain it
Multisig requires ongoing maintenance: verifying backups, keeping hardware functional, updating software, maintaining documentation. If you won't realistically do this, a simpler setup or professional custody may be safer.
For frequent transactions
If you spend regularly, multisig coordination becomes burdensome. Consider:
- Single-key hot wallet for frequent, small transactions
- Multisig cold storage for long-term holdings
- Move bitcoin from cold to hot as needed
Without proper understanding
A poorly-implemented multisig is worse than well-implemented single-key. If you don't understand what you're doing, you're more likely to lose the wallet configuration, create unspendable addresses, back up incorrectly, or make mistakes during spending.
Learn thoroughly before implementing, or use collaborative custody where a provider handles the complexity.
Maintaining multisig over time
Multisig is not set-and-forget. Long-term security requires ongoing attention.
Periodic verification
At least annually:
- Verify each seed phrase backup is readable and accessible
- Confirm hardware wallets power on and function
- Test that you can reconstruct the wallet from backups
- Verify the wallet configuration backup is intact
- Review whether the setup still matches your needs
Hardware lifecycle
Hardware wallets don't last forever:
- Batteries die
- Firmware becomes outdated
- Manufacturers discontinue products
- New security vulnerabilities emerge
Plan for replacement. When upgrading: set up new device, verify it works with your multisig, consider migrating to fresh keys if old hardware is compromised, update documentation.
Software updates
Keep wallet software updated, but carefully:
- Wait for initial bug reports after new releases
- Verify updates from official sources
- Test with small amounts after updating
- Maintain ability to use older versions if needed
Life changes
Your setup should evolve with your life. Moving? Update key storage locations. New family members? Consider succession. Changed threat model? Reassess configuration.
Documentation for others
Your multisig is useless to heirs if they can't understand it. Write clear reconstruction instructions, explain where each component is stored, identify who to contact for help, test that someone else can follow your documentation.
→ Read: Bitcoin Inheritance Planning
Further reading
- Bitcoin Security Guide. Security fundamentals.
- Bitcoin Custody vs Hardware Wallet vs Multisig. Comparing options.
- Bitcoin Inheritance Planning. Succession for self-custody.
- How to Choose a Bitcoin Custody Provider. If collaborative custody appeals.
- What Breaks Custody. Common failure patterns.
Further sources
- BIP11: M-of-N Standard Transactions. Original multisig standard.
- BIP16: Pay to Script Hash. P2SH enabled widely-used multisig.
- BIP67: Deterministic ordering of public keys. Key sorting for consistent address generation.
- BIP174: Partially Signed Bitcoin Transaction Format. PSBT standard for coordinated signing.
- Bitcoin Core: Output script descriptors. Precise wallet policy format including multisig.