• Anyone who wants to self-custody their Bitcoin should not start with a solution, but with the right questions:

  • Attack scenarios

    Which risks are realistic for me?

  • Complexity

    How much complexity can I handle — and am I willing to take on?

  • Comfort

    Which security solution feels right for me in the long run?

  • Too little security can be risky. But too much complexity can be just as risky. A good solution does not only protect you — it also has to fit you.

  • Understanding attack scenarios

    Before choosing a solution, it should be clear what you actually want to protect yourself against: online attacks, theft, loss, disasters, or the risk of locking yourself out.

  • Security vs. Complexity

    More security is not automatically better. A solution is only good if it remains practical and workable in everyday life.

  • Security vs. Comfort

    Your security solution should not only protect you — it should also make you feel safe and comfortable using it.

  • The 4 Levels of Self-Custody

  • 0. Exchange

    ❌ You do not own any Bitcoin

  • 1. Hot Wallet

    🔑 Your seed = YOUR Bitcoin

  • 2. Cold Storage

    🔐 Protection against online attacks

  • 3. Disaster Protection

    🛡️ Protection against personal attacks / disasters

  • Loss through viruses / malware

  • Loss through theft / burglary

  • Destruction through disasters, e.g. fire

  • Forgetting / locking yourself out

  • {"type":"root","children":[{"type":"text","value":"Depending on your situation, some risks are more likely than others: online attacks, theft, loss, disasters, or the risk of locking yourself out. That is exactly why there is no standard solution.","bold":true}]}

  • Getting started with self-custody

  • Choosing the right wallet

  • Seed backup and secure storage

  • Passphrase as an additional layer of security

  • Redundancy and backup strategies

  • Guidance through the 4 levels of self-custody

  • ...and much more!

Request a Consultation

Every starting point is different.
Briefly tell us where you currently stand and what you need support with.
We’ll get back to you with a suitable recommendation for the next step.

  • Bitcoin self-custody can look very different from one person to the next.

    Many security solutions can be combined. Others only make sense in specific combinations. That is exactly why the topic feels overwhelming for many people.

    What matters is not building as much complexity as possible, but finding a solution that fits your attack scenarios, your security needs, and your everyday life.

Examples of Self-Custody Security Solutions

  • Hardware wallets (e.g. BitBox, Jade, Specter, Keystone, etc.)
  • Passphrase
  • MultiSig (e.g. 2-of-3)
  • Shamir’s Secret Sharing (e.g. 2-of-3)
  • Brain Wallet
  • Paper Wallet
  • Kill Switch (e.g. Liana)
  • Metal backup (e.g. Titan, ExitKey, DIY, etc.)
  • ...
  • Simplicity

    Not every additional layer of security automatically makes a setup better.

  • Combinations

    Many solutions can be combined in a meaningful way — but not every combination fits every person.

  • Guidance Instead of Overengineering

    The goal is not the most complex setup possible, but a solution that you understand and can implement properly.