A comparison of the Existing Bitcoin Self-Custody Protocols

Protocols Overview

Self-custody remains a cornerstone of Bitcoin’s ethos: Not your keys, not your coins. But the path to securely holding your own Bitcoin varies widely depending on your goals, level of technical expertise, and trust assumptions.

In this guide, we explore and compare three prominent Bitcoin cold storage and multisig protocols:

Each of these protocols presents a unique approach to balancing security, usability, and long-term resilience, reflecting the diverse needs of Bitcoin users—from institutions to everyday hodlers.

This breakdown isn’t just a checklist; it’s an experience-focused walkthrough of how each protocol works in real-life scenarios, emphasizing not just the what, but also the why and how.

FeatureGlacierCerberusBTC Guide
Primary FocusMaximum security for high-value storageBalanced security and usabilityModern hardware wallet integration
Creation Date2017 (Original version)20212020
Multisig Configuration2-of-4 (original)2-of-3Flexible (typically 2-of-3)
Key Storage MethodPaper wallets with QR codesHardware wallets + offline backupsHardware wallets + seed phrases
Air-gapped ApproachQuarantined computers + USB transferHardware security modulesHardware wallets as HSMs
Complexity LevelHighMediumLow to Medium
Primary AudienceInstitutional/high-net-worth usersTechnical Bitcoin usersMainstream Bitcoin users
Documentation StyleDetailed procedural documentTechnical implementation guideTutorial-style guide
Transaction CreationOffline signing with QR codesHardware wallet signingHardware wallet signing

Detailed Protocols Steps

Let’s break down each protocol across all the phases involved in a complete Bitcoin custody lifecycle, from setup to maintenance. For each step, we identify similarities, differences, and key observations.

1. Preparation Phase

Goal: Set up a secure environment before generating keys.

StepGlacierCerberusBTC GuideNotes
Acquire HardwareCommon to all
Verify Hardware IntegrityCommon to all
Create Bootable USB Drives✓ (Tails OS)✓ (Ubuntu)✓ (Tails OS)Common to all but OS differs
Set Up Air-gapped Environment✓ (Two quarantined laptops)✓ (Air-gapped workstation)✓ (Hardware wallet approach)Different implementations
Disable Networking✓ (Physical network removal)✓ (Boot without networking)✓ (Use of airplane mode)Different severity levels
Verify Software Authenticity✓ (Extensive verification)✓ (PGP verification)✓ (Basic verification)Different verification rigor

2. Key Generation Phase

Goal: Securely create the keys that will control your Bitcoin.

StepGlacierCerberusBTC GuideNotes
Generate Entropy✓ (Dice + coinflips)✓ (Hardware RNG)✓ (Hardware wallet)Different entropy sources
Create Private Keys✓ (Software-generated)✓ (Hardware wallet)✓ (Hardware wallet)Glacier unique in software generation
Verify Key Generation✓ (Mathematical verification)✓ (Test signatures)✓ (Basic testing)Different verification methods
Create Seed Phrases✗ (Uses raw private keys)✓ (BIP39 seeds)✓ (BIP39 seeds)Glacier unique in not using BIP39

3. Backup Creation Phase

Goal: Protect the keys through redundancy without introducing risk.

StepGlacierCerberusBTC GuideNotes
Paper Backups✓ (Primary method)✓ (Secondary method)✓ (For seed phrases)Different importance
Metal Backups✓ (Recommended)✓ (Primary method)✓ (Recommended)Common to all
Digital Encrypted Backups✗ (Avoids digital storage)✓ (For public keys)✓ (For public keys)Glacier unique in avoiding digital
QR Code Generation✓ (For private keys)✓ (For public keys)✓ (For addresses)Different information encoded
Seed Phrase Recording✗ (Not used)✓ (Required)✓ (Required)Glacier unique in not using seeds
Passphrase Management✓ (For keypair encryption)✓ (For BIP39)✓ (For BIP39)Different implementation

4. Multisig Wallet Creation Phase

Goal: Combine individual keys into a single multisig wallet for secure spending.

StepGlacierCerberusBTC GuideNotes
Create Multisig Script✓ (Manual script creation)✓ (Software assisted)✓ (Wallet software)Different levels of abstraction
Verify Multisig Address✓ (Mathematical verification)✓ (Multiple device checks)✓ (Software verification)Different verification methods
Test Small TransactionCommon to all
Document Wallet Details✓ (Detailed documentation)✓ (Technical details)✓ (Configuration backup)Different documentation focus

5. Backup Security Phase

Goal: Physically and procedurally secure your key backups over time.

StepGlacierCerberusBTC GuideNotes
Geographic Distribution✓ (Multiple locations)✓ (Multiple locations)✓ (Multiple locations)Common to all
Tamper-Evident Storage✓ (Tamper-evident bags)✓ (Tamper-evident seals)✓ (Basic recommendations)Different implementation rigor
Inheritance Planning✓ (Detailed procedures)✓ (Basic guidance)✓ (Basic guidance)Glacier unique in detailed inheritance
Access Controls✓ (Safe deposit boxes)✓ (Personal safes)✓ (Basic recommendations)Different implementation suggestions

6. Transaction Execution Phase

Goal: Safely sign and broadcast a transaction using multisig.

StepGlacierCerberusBTC GuideNotes
Prepare Transaction✓ (Watch-only wallet)✓ (Wallet software)✓ (Wallet software)Different software approaches
Air-gapped Signing✓ (QR code transfer)✓ (Hardware wallet)✓ (Hardware wallet)Glacier unique in QR approach
Multi-person Verification✓ (Required)✓ (Recommended)✓ (Optional)Different emphasis
Transaction Broadcasting✓ (From quarantine PC)✓ (From online device)✓ (From online device)Similar approach
Transaction Confirmation✓ (Multiple verification)✓ (Block explorer)✓ (Block explorer)Different verification rigor

7. Maintenance Phase

Goal: Regularly test, audit, and future-proof your setup.

StepGlacierCerberusBTC GuideNotes
Regular Security Audits✓ (Comprehensive)✓ (Recommended)✓ (Basic guidance)Different levels of detail
Protocol Updates✓ (Version tracking)✓ (Ongoing development)✓ (Community updates)Different update approaches
Key Rotation Policy✓ (Detailed procedures)✓ (Basic guidance)✓ (Optional)Different emphasis
Test Recovery Procedures✓ (Regular testing)✓ (Recommended)✓ (Basic guidance)Different testing frequency

Key Philosophical Differences

  1. Security vs. Usability Balance:
    • [G] Maximum security, even at usability cost
    • [C] High security with acceptable usability
    • [B] Balances security with mainstream usability
  2. Trust Assumptions:
    • [G] Minimal trust in hardware and software
    • [C] Trusts hardware security modules
    • [B] Trusts hardware wallet vendors
  3. Technical Knowledge Required:
    • [G] Highest technical requirements
    • [C] Moderate technical knowledge
    • [B] Designed for mainstream users
  4. Approach to Future-proofing:
    • [G] Comprehensive documentation
    • [C] Technical robustness
    • [B] Community maintenance

Protocol-Specific Unique Features

Either the multisig process could seem the same, each protocol adopts some key differences that enable each one of them to differentiate. Listed below the list of unique features we have identified for each protocol.

Glacier Protocol Unique Features

  • Mathematical Verification Steps: Extensive checks using cryptographic math
  • Cold Storage Calculator: Tool to calculate appropriate security level based on funds
  • Adversary Resistance: Specific countermeasures for various attack vectors
  • Raw Private Keys: Uses raw keys rather than seed phrases
  • Parallel Independent Verification: Two people perform critical steps independently
  • Eternally Quarantined Hardware: Computers never reconnect to the internet
  • Protocol Version Control: Strict versioning of documents and procedures

Cerberus Protocol Unique Features

  • Tiered Security Approach: Different security levels based on holdings
  • Hardware-first Philosophy: Built around hardware security modules
  • Metal Key Storage: Emphasis on physical durability
  • Technical Implementation Focus: More technical details, less prescriptive
  • Integration with Modern Tools: Works with current Bitcoin ecosystem
  • Supply Chain Security: Specific measures for hardware procurement
  • Social Recovery Options: Provisions for assisted recovery

BTC Guide Unique Features

  • Accessibility Focus: Written for mainstream Bitcoin users
  • Step-by-step Tutorials: Visual guides for each step
  • Software Recommendations: Specific software guidance
  • Progressive Security Model: Start simple and add security incrementally
  • Community Maintenance: Continuously updated by the community
  • Compatibility Emphasis: Ensures tools work together correctly
  • Mobile Verification Options: Includes options for mobile device verification

Common Elements Across All Protocols

Despite their unique features, all three protocols share some essential DNA:

  1. Multisignature Approach: All use multiple keys for security
  2. Air-gapped Operations: All employ some form of network isolation
  3. Test Transactions: All verify wallet operation with small amounts
  4. Redundant Backups: All require multiple backups of key material
  5. Geographic Distribution: All recommend storing backups in multiple locations
  6. Hardware Security: All emphasize physical security of components
  7. Verification Procedures: All include steps to verify correct operation

Choosing the right Bitcoin custody protocol is less about picking the best one and more about choosing what fits your reality. Glacier is a fortress for institutions; Cerberus is a flexible toolkit for serious Bitcoiners; BTC Guide is a ramp for everyday users stepping into self-custody with confidence.

Each path demands intentionality. And that’s what this comparison is about, not just information, but interaction with the systems, choices, and values behind Bitcoin custody.

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *