This guide helps you understand the trade-offs between "I hold 2 keys, vendor holds 1" (assisted multisig) versus true collaborative custody with documented recovery processes.
π Critical Concept: Email β Key Security
Your email is for identity and coordination β NOT for key security.
Many users mistakenly think losing email access = losing funds. This is not true for properly configured multisig.
- Portal login access
- Recovery coordination
- Communication with service
- Account notifications
- Bitcoin access (spending)
- Transaction signing
- Actual custody of funds
- Recovery of wallet
π€ What happens if I lose access to my email?
Your funds remain safe on-chain.
- Contact service support with identity verification
- Or create new account with new email
- Re-import your wallet using your seed phrases/keys
- Use a long-term personal email (not work-based)
- Keep email credentials in your estate documents
- Document your security questions for heirs
Model Comparison: Side by Side
π΅ Assisted Multisig (2-of-3)
Setup: You hold 2 keys, vendor holds 1 backup key
- Easy to set up
- Vendor can't steal (needs your 2 keys)
- Lose 1 key? Vendor helps recover
- Lower cost
- Single point of failure: YOU
- Illness/incapacity = no access
- Coercion ("sign with your 2 keys")
- Travel confiscation (if you carry both)
- No documented recovery for heirs
- Vendor key requires trusting their process
- Individual holders
- Lower amounts (under $100K)
- Short-medium term (1-5 years)
- Low geopolitical risk
π’ Collaborative Custody
Setup: Quorum model with documented processes, third-party key holders, and recovery procedures
- No single point of failure
- Documented recovery processes
- Geographic distribution of keys
- Estate planning integration
- Coercion resistance (needs multiple parties)
- Professional processes & procedures
- More complex to set up
- Higher costs (professional services)
- Requires coordination with third parties
- More documentation needed
- Large holdings (over $100K)
- Multi-generational wealth
- Business/entity funds
- High geopolitical risk areas
- Elderly or health-compromised holders
Single Point of Failure Analysis
Scenario-Based Risk Assessment
How does each model handle real-world threats?
Decision Quiz: Which Model Fits You?
Answer 5 Quick Questions
We'll recommend the best security model for your situation
Hardware Wallet Compatibility Matrix
Different hardware wallets have different seed formats and setup quirks. Here's what to expect with popular devices for multisig setups:
Trezor One
β SupportedTrezor Safe 3 / Safe 5
β SupportedLedger Nano X / S Plus
β SupportedColdcard Mk4 / Q1
β SupportedBitBox02
β SupportedJade / Passport
π‘ QR WorkflowSome hardware wallets call your change address a "second recipient." This is normal! When you send Bitcoin, any leftover amount returns to your wallet as "change"βit's not going to someone else, it's coming back to you.
You have: 0.01 BTC
You send: 0.003 BTC
Change back to you: 0.007 BTC (minus fees)
β Your device shows this as 2 outputs: one to recipient, one to yourself (change)
Next Steps
If You Choose Assisted Multisig:
- Set up 2-of-3 with Unchained, Casa, or Nunchuk
- Store keys in separate locations (never together)
- Document your setup (encrypted, secure location)
- Test recovery process at least once
- Create a "letter to heirs" explaining how to contact vendor
If You Choose Collaborative Custody:
- Research providers: TBA by Choice, Onramp, or attorney-based solutions
- Understand quorum requirements (typically 2-of-3 or 3-of-5)
- Establish relationships with key holders (attorney, trusted advisor, family office)
- Document inheritance & incapacity procedures
- Schedule annual reviews of the setup