Loading Hacking Lives...

Bitcoin self-custody

Managing your own assets independently of a third-party custodian is known as self-custody. In the context of Bitcoin, self-custody means having total control over your assets, including the private keys that allow you to access and use your funds. Self-custody wallets, also referred to as non-custodial wallets, are software or hardware wallets that hold your private keys, often represented as a seed phrase for easier interpretation. If you're technically inclined, you can learn more about mnemonic representation here.

Self-custody means that you, and only you, are fully responsible for your assets. No third party can interfere with or modify them. This offers benefits like full sovereignty and freedom but requires you to take full responsibility. This article simplifies the process into a few easy steps.

1. Wallets

Wallets keep your private keys secure and accessible, allowing you to send and receive Bitcoin easily and securely. Unlike a traditional wallet that holds cash, Bitcoin wallets don’t store your Bitcoin. Your assets live on the blockchain but can only be accessed using the private key stored in the wallet.

1.1 Software Wallet

A software wallet is a type of Bitcoin wallet that can be installed on a computer or mobile device. Because it’s online, it’s easier to hack than a hardware wallet and is often called a "hot wallet." Software wallets are popular for smaller amounts due to their ease of use and free availability. Key points about software wallets:

These wallets are not suitable for large amounts or long-term holding (HODLing).

1.2 Hardware Wallet

A hardware wallet is a Bitcoin wallet that keeps private keys secure offline. It’s less vulnerable to hacking than software wallets because it’s not connected to the internet, earning it the name "cold wallet." Hardware wallets, such as plug-in devices or USB drives, are designed solely to secure private keys and sign Bitcoin transactions offline. They are the safest way to store your Bitcoin keys.

Key points about hardware wallets:

Note: I use Trezor devices, but this is not a recommendation.

2. Buying a Hardware Wallet

When purchasing a hardware wallet, ensure:

3. Setting Up a Hardware Wallet

When you connect your hardware wallet to a computer, it will prompt you to install firmware and then create a new wallet or restore an existing one. Assuming you’re a new user, you’ll create a new wallet.

trezor-suite-1.png

trezor-suite-2.png

Note: Most wallets follow the BIP39 standard, meaning you can restore your wallet on another device that supports BIP39.

3.1 Seed

The seed phrase is a mnemonic representation of your private keys. Follow these steps:

trezor-suite-3.png

trezor-suite-4.png

3.1.1 Twelve Words

A 12-word seed provides 128 bits of entropy, making it extremely secure. Brute-forcing it would take billions of years.

3.1.2 Twenty-Four Words

A 24-word seed adds more entropy but is unnecessary for most users. The security difference is negligible, and it complicates storage and recovery.

sha-256-seed-generating.png

3.1.3 Shamir Secret Shares

Shamir Secret Shares split your seed into multiple shares (e.g., 2 out of 3), reducing the risk of a single point of failure. If you lose one share, you can still recover your wallet with the others. This is ideal for large amounts or inheritance planning.

trezor-shamir.jpg

3.2 Passphrase

A passphrase is an additional word or phrase that adds another layer of security. It acts like a 13th or 25th word, creating a different wallet. Even if your seed is compromised, the passphrase protects your funds.

passphrase.png

Key points:

hidden-wallet.jpg

3.3 PIN

The PIN unlocks your hardware wallet. If you forget it, you can restore your wallet using the seed and passphrase. Store your PIN securely, such as in a password manager.

3.4 Difference Between Seed, Passphrase, and PIN

3.5 Storing Seed and Passphrase

Storing your seed and passphrase on paper is risky due to fire, water damage, or loss. Instead, use a metal solution for durability. Options include:

steel-washers-seed-backup.webp

For more, see Jameson Lopp’s metal solution tests.

Conclusion

To achieve full sovereignty over your Bitcoin, follow these steps:

  1. Use a non-custodial software wallet for daily spending.
  2. Get a hardware wallet for long-term storage.
  3. Generate a new seed securely.
  4. Implement a passphrase for added security.
  5. Test your setup with a small transaction.
  6. Store your seed and passphrase on metal in separate, safe locations.

By taking these steps, you become a self-sovereign individual in control of your Bitcoin.

Disclaimer: I am not affiliated with any products mentioned. All opinions are my own.