Inheritance Planning for Crypto Assets
We talk about self-custody as though the story ends with you. It does not. The entire architecture of holding your own keys — the hardware wallets, the seed phrases, the geographic distribution, the operational security — all of it assumes you will be around to use it. When you are not, the sovereig
The Problem No One Wants to Think About
We talk about self-custody as though the story ends with you. It does not. The entire architecture of holding your own keys — the hardware wallets, the seed phrases, the geographic distribution, the operational security — all of it assumes you will be around to use it. When you are not, the sovereignty you built becomes a locked room with no key on the outside. The assets do not transfer to your heirs. They do not enter probate. They sit on the blockchain, controlled by keys that no living person possesses, and they stay there permanently.
This is the most neglected dimension of self-custody, and it is also the most consequential. Estimated figures suggest that somewhere between three and four million BTC are permanently lost — a significant portion due to death or lost keys . That number grows every year. Every person who builds a robust self-custody setup and dies without an inheritance plan converts their sovereignty into waste. The bitcoin does not return to circulation. It simply ceases to be accessible, a monument to preparation that stopped one step short.
The traditional financial system handles death clumsily but reliably. Banks have beneficiary designations. Brokerage accounts have transfer-on-death provisions. Courts can compel institutions to release assets to estates. None of this applies to self-custodied cryptocurrency. There is no institution to compel. The blockchain does not recognize death certificates, court orders, or the wishes of the deceased. It recognizes private keys, and nothing else.
Why Inheritance Is Harder Than It Looks
The difficulty is not emotional, though it is that too. The difficulty is structural. Self-custody is designed to prevent anyone other than you from accessing your funds. That is the entire point. Inheritance planning requires creating a controlled exception to that design — a way for someone else to access your funds, but only when you cannot, and only the specific someone you choose.
This creates a tension that does not exist in traditional finance. Every mechanism you create for your heirs to access your crypto is, by definition, a mechanism that could be exploited while you are alive. A letter explaining your setup is a theft risk if discovered. A shared key is a trust risk from the moment you share it. A dead man’s switch is a false-positive risk if it triggers while you are on vacation. The challenge is not finding a solution; it is finding a solution that does not compromise your security in the present while ensuring your heirs can access the funds in the future.
The knowledge gap compounds the structural problem. Your heirs likely do not understand cryptocurrency, hardware wallets, seed phrases, or multi-signature setups. Even if they possess the keys, they may not know what to do with them. A seed phrase written on a steel plate is meaningless to someone who has never heard the term. A Coldcard in a safe deposit box is an expensive paperweight without instructions. The inheritance plan must transfer not just access, but competence — or at least a clear enough set of instructions that competence is not required.
The Instruction Letter
The simplest approach, and the one most people should start with, is a detailed instruction letter stored securely. This is not a will. It is a technical document that tells your designated person what you own, where the keys are, and exactly how to recover the funds.
The letter should include an inventory of your holdings — which cryptocurrencies, approximate amounts, and which wallets or addresses hold them. It should describe your custody setup: what hardware wallets you use, where they are physically located, what PINs or passwords protect them. It should provide the location of your seed phrase backups, including any passphrase (25th word) you use. And it should include step-by-step recovery instructions written for someone who has never touched a hardware wallet, because that is almost certainly who will be reading it.
The letter itself is a security risk, which means its storage matters enormously. A sealed envelope in a safe deposit box, a sealed envelope with a trusted attorney, a sealed envelope in a home safe — each has trade-offs between accessibility and security. The letter should not be stored digitally. It should not be emailed, uploaded to cloud storage, or photographed. It exists in one or two physical copies, stored with the same care you would give the seed phrase itself, because in some respects it is more dangerous — it contains not just the keys but the map to the keys.
You should update this letter annually. Holdings change. Wallet setups change. Relationships change. A letter written three years ago that references a hardware wallet you no longer use or a safe deposit box you closed is worse than no letter at all, because it creates false confidence in a plan that no longer works.
Time-Locked Transactions and Dead Man’s Switches
Bitcoin’s protocol offers a native mechanism for inheritance planning that most people overlook: nLockTime. This feature allows you to create a signed transaction that is valid but cannot be broadcast until a specified future date. You create a transaction sending your bitcoin to your heir’s address, sign it, and give the signed transaction to your heir or a trusted intermediary. If you die before the lock date, the transaction can be broadcast once the time arrives. If you are still alive, you simply move your bitcoin to a new address before the lock date, invalidating the old transaction, and create a new time-locked transaction with a later date.
This is a dead man’s switch built into the protocol itself. It requires no third-party service, no smart contract, and no trust beyond the person holding the signed transaction. The downside is maintenance: you must remember to renew the transaction before each lock date expires. If you forget — because you are traveling, because you are ill, because life intervened — the transaction becomes valid and your heir can claim the funds while you are still alive. This is not theft; you gave them the transaction. But it is an unintended transfer that could have consequences.
The approach works best as one layer of a broader inheritance plan, not as the sole mechanism. It pairs well with other strategies, providing a backup that activates automatically if all else fails.
Multi-Signature Inheritance
Multi-sig, discussed in detail earlier in this series, is perhaps the most elegant inheritance mechanism available. A 2-of-3 multi-sig setup distributes three keys: you hold two, and a trusted party — a family member, an attorney, or a collaborative custody service — holds one. During your lifetime, you sign transactions with your two keys. The third party cannot move funds without your cooperation.
On your death, the plan activates. Your heir receives one of your keys — from your instruction letter, from a safe deposit box, from an attorney. They now hold one key. The trusted third party holds one key. Together, they have the required two of three signatures, and they can move the funds. No single party ever had unilateral access. The structure survived your death without a single point of failure.
Collaborative custody services like Casa and Unchained Capital have formalized this model, offering inheritance planning as an explicit feature of their multi-sig products . They hold one key, you hold two (or in some configurations, you hold one and a second key is stored in a geographic backup location). On your death, the service coordinates with your designated heir to complete the required signatures. This adds a layer of professional support to a process that most heirs will find unfamiliar and stressful.
The complexity trade-off is real. Multi-sig inheritance requires your heir to understand — or be guided through — a multi-sig signing process. It requires the collaborative custody service to still be operating when you die. It requires the keys to be maintained and accessible across what could be decades. But for significant holdings, the security advantages outweigh the complexity costs.
Legal Integration
Your will should mention that you hold cryptocurrency assets. It should not contain your seed phrases, PINs, or detailed custody instructions — a will becomes a public document during probate, and you do not want your keys in the public record. The will should reference the existence of a separate instruction letter and designate who receives it.
Designate a crypto-literate executor if possible. If your executor does not understand cryptocurrency, the recovery process depends entirely on the quality of your instruction letter — and an executor who cannot assess whether the instructions are being followed correctly is at a disadvantage. If no one in your immediate circle has the necessary knowledge, consider whether a collaborative custody service with inheritance features fills that gap.
For substantial holdings, a trust structure may be appropriate. A trust can hold the instruction letter, designate the conditions under which it is opened, and provide legal authority for the trustee to manage the recovery process. The trust also avoids probate, which means the existence and details of your crypto holdings do not become public record. Consult an attorney who understands both estate planning and digital assets — this is an emerging specialty, and general estate attorneys may not appreciate the unique characteristics of self-custodied cryptocurrency.
The Conversation You Need to Have
The most sophisticated inheritance plan fails if your heirs do not know it exists. This is the step most people skip, because it requires talking about both death and money — two subjects that most families avoid. But sovereignty that dies with you is not sovereignty. It is just loss.
Your designated heir needs to know, at minimum, that you hold cryptocurrency, that it requires specific keys to access, that you have a plan for transferring those keys, and where to find the instructions. They do not need to know the details of your holdings or your security setup. They need to know that a plan exists and how to activate it.
Consider whether your heir needs some baseline education now. Walking them through the concept of a hardware wallet, showing them what a seed phrase looks like, explaining the basic recovery process — this does not compromise your security, and it dramatically improves the probability that your plan actually works. A plan that depends on your heir figuring out unfamiliar technology while grieving is a plan that may not survive contact with reality.
Review the plan annually. Update the letter. Test the process mentally — walk through the scenario and ask whether someone with your heir’s current knowledge could actually execute it. If the answer is no, either simplify the plan or invest in their education. The goal is not a plan that is technically perfect. The goal is a plan that actually works when someone who is not you tries to use it.
This article is part of the Self-Custody & Cold Storage series at SovereignCML.
Related reading: Multi-Signature Setups: Eliminating Single Points of Failure, Backup Strategies That Survive Disasters, The Self-Custody Checklist: Putting It All Together