Introduction
This protocol provides a comprehensive guidelines and framework for organizations of any size to establish secure multisignature Bitcoin self-custody solutions using Bitcoin-Safe. Based on best practices from established protocols like Cerberus, BTCGuide, and Glacier Protocol, this framework has been adapted to leverage Bitcoin-Safe’s desktop wallet and Nostr-based remote signing capabilities.
This protocol currently combines the strongest security practices from three established Bitcoin security protocols:
- Glacier Protocol: Known for its mathematical verification and high security for large holdings
- Cerberus Protocol: Focuses on hardware security with modern tooling
- BTC Guide: Emphasizes accessibility and integration with current Bitcoin ecosystem
Throughout this document, steps are marked with:
[ALL]: Common to all three protocols[G]: Specific to or emphasized in Glacier Protocol[C]: Specific to or emphasized in Cerberus Protocol[B]: Specific to or emphasized in BTC Guide[NEW]: New recommendations based on current best practices
Phase 1: Preparation
1.1 Environment Setup
1.1.1 Secure Location [ALL]
- Choose a private location free from electronic surveillance
- Ensure the location has no cameras or listening devices
[G]Consider electromagnetic shielding if handling extremely high-value wallets
1.1.2 Hardware Acquisition [ALL]
- Purchase new computing hardware from reputable vendors
[G]Two laptops or computers for quarantined operations[C]At least one computer for air-gapped operations[B]Computer sufficient to run wallet software
- Purchase hardware wallets:
[C/B]Minimum 3 hardware wallets, ideally from different manufacturers[ALL]Verify hardware wallet authenticity upon receipt
1.1.3 Software Preparation [ALL]
- Download required software from official sources:
- Operating systems:
[G/B]Tails OS[C]Ubuntu LTS
- Bitcoin-specific software:
[G]Bitcoin Core-
[C/B]Electrum, Specter Desktop, or Sparrow Wallet
- Operating systems:
[ALL]Verify software authenticity:- Check PGP signatures
- Verify checksums from multiple sources
[G]Compare checksums on multiple devices
1.1.4 Air-gapped Environment Creation [ALL]
[G]Physically remove wireless cards from quarantined laptops[G/B]Boot operating system with networking disabled[ALL]Verify network disconnection:- Confirm no network interfaces are active
[G]Use external verification tool to confirm no signals
1.2 Essential Supplies
1.2.1 Key Material Recording [ALL]
[G]Acid-free archival paper[G/B]BIP39 seed phrase recording cards[C]Metal backup solutions (Cryptosteel, Billfodl, etc.)[ALL]Permanent ink pens (archival quality)
1.2.2 Physical Security [ALL]
- Tamper-evident bags or security seals
- Waterproof and fireproof storage containers
[G/C]Faraday bags for device storage[ALL]Safes or secure storage locations
1.2.3 Entropy Sources [ALL]
[G]Casino-grade dice (at least 5)[C]Hardware random number generator (optional)[B]Hardware wallet built-in entropy
Phase 2: Key Generation
2.1 Entropy Generation
2.1.1 Entropy Method Selection
[G]Dice rolling procedure (100+ dice rolls recorded)[C/B]Hardware wallet internal entropy[NEW]Combined entropy sources for maximum security
2.1.2 Entropy Documentation [G]
- Record entropy generation process
- Verify entropy quality (statistical tests)
- Protect entropy records from observation
2.2 Key Creation
2.2.1 Key Generation Approach
[G]Software-based key generation using recorded entropy[C/B]Hardware wallet key generation[NEW]Consider hybrid approach for highest security needs
2.2.2 Verification of Key Material [ALL]
[G]Mathematical verification of private key validity[C/B]Test signatures with generated keys[ALL]Record public keys and verification data
2.3 Multisignature Setup
2.3.1 Multisig Structure Definition [ALL]
- Determine M-of-N threshold requirements:
[G]Default 2-of-4 configuration[C]Default 2-of-3 configuration[B]Flexible based on user needs
[ALL]Document the chosen multisig structure
2.3.2 Multisig Script Creation
[G]Manual creation and verification of redeem script[C/B]Software-assisted multisig wallet creation[ALL]Record multisig wallet details (redeem script, derivation paths)
2.3.3 Receiving Address Verification [ALL]
- Generate test receiving address
- Verify address derivation on multiple devices
[G]Perform mathematical verification of address correctness
Phase 3: Backup Creation
3.1 Primary Backups
3.1.1 Seed Phrase Recording [C/B]
- Write down BIP39 seed phrases
[C/B]Add optional passphrase protection- Verify seed phrase accuracy through reading back
3.1.2 Raw Private Key Backup [G]
- Create QR codes for private keys
- Print private keys with redundant encoding
- Verify printouts are scannable and accurate
3.1.3 Metal Backups [ALL]
[C]Primary backup method using metal storage[G/B]Secondary backup for disaster protection[ALL]Verify metal backup accuracy
3.2 Secondary Backups
3.2.1 Distribution Package Creation [ALL]
- Prepare instructions for each backup location
- Include only necessary information for each location
[ALL]Create recovery instructions
3.2.2 Digital Public Key Backup [C/B]
- Export wallet files containing only public keys
- Create digital backup of wallet configuration
[C/B]Back up multisig coordination files
3.2.3 Emergency Access Documentation [G]
- Create detailed inheritance instructions
- Set up emergency recovery procedures
- Document contact information for trusted parties
Phase 4: Security Implementation
4.1 Verification Testing
4.1.1 Test Transaction [ALL]
- Send small amount to multisig wallet
- Verify receipt on watch-only wallet
[ALL]Document the verification result
4.1.2 Recovery Testing [ALL]
- Practice recovery procedures from backup materials
- Verify ability to sign transactions with each key combination
[G]Document detailed recovery process
4.2 Physical Security
4.2.1 Backup Distribution [ALL]
- Implement geographic distribution plan:
[G]Distribute backups to separate physical locations[C]Use bank vaults and personal secure storage[B]Balance security with accessibility
4.2.2 Tamper Protection [ALL]
- Seal all physical materials in tamper-evident packaging
- Record serial numbers of security seals
[G/C]Photograph packaged materials before storage
4.3 Access Control
4.3.1 Access Procedures [ALL]
- Document who has access to each storage location
- Implement dual control for critical storage locations
[G]Create comprehensive access logs
4.3.2 Emergency Access Protocol [G/C]
- Define conditions for emergency access
- Create verifiable authentication procedures
- Document emergency contact sequence
Phase 5: Operational Procedures
5.1 Transaction Creation
5.1.1 Transaction Initiation [ALL]
- Prepare transaction details in watch-only wallet
[G]Use cold storage calculator to determine appropriate security measures- Verify transaction details on multiple devices
5.1.2 Air-gapped Signing
[G]Transfer unsigned transaction via QR codes[C/B]Sign transaction with hardware wallets[ALL]Verify signed transaction before broadcasting
5.1.3 Broadcasting [ALL]
- Broadcast signed transaction to Bitcoin network
- Verify transaction inclusion in blockchain
- Document transaction details for records
5.2 Security Maintenance
5.2.1 Regular Verification [ALL]
- Schedule periodic checks of backup integrity
[G]Test recovery procedures annually[C/B]Update firmware and software as needed
5.2.2 Protocol Updates [ALL]
- Monitor for security vulnerability announcements
- Update security procedures as best practices evolve
[G]Track protocol version used for each operation
5.2.3 Key Rotation Considerations [G/C]
[G]Define conditions requiring key rotation- Document key rotation procedures
- Implement key rotation schedule for highest security
Phase 6: Advanced Procedures
6.1 Inheritance Planning
6.1.1 Legal Documentation [G]
- Create legal framework for Bitcoin inheritance
- Document Bitcoin assets in estate planning
- Ensure legal recognition of digital asset instructions
6.1.2 Inheritance Instructions [ALL]
- Create simplified recovery instructions for heirs
[G]Implement dead man’s switch mechanism[C/B]Consider assisted recovery services
6.2 Adversarial Considerations
6.2.1 Duress Protection [G]
- Implement duress codes and procedures
- Create decoy wallets if warranted
- Document response to physical security threats
6.2.2 Plausible Deniability [G/C]
- Consider hidden wallet capabilities
- Implement information compartmentalization
[G]Create multi-level security access
Phase 7: Recovery Procedures
7.1 Standard Recovery
7.1.1 Key Reconstruction [ALL]
- Procedures to recover from seed phrases/private keys
- Wallet reconstruction steps
[ALL]Verification steps for recovered wallet
7.1.2 Transaction Creation Post-Recovery [ALL]
- How to create transactions after recovery
- Verification procedures for recovered wallet
[G]Full mathematical verification of wallet state
7.2 Emergency Recovery
7.2.1 Lost Key Procedures [ALL]
- Document steps for accessing funds when one or more keys are lost
- Implement recovery using remaining keys to meet multisig threshold
[C/B]Calculate security implications of reduced key threshold[B]Transfer to new wallet setup with full key complement as soon as practical
7.2.2 Disaster Recovery [ALL]
- Steps for recovery after natural disasters
[G]Waterproof/fireproof recovery materials utilization[C]Metal backup recovery procedure[ALL]Site-specific recovery considerations for each backup location
7.2.3 Compromised Key Response [ALL]
- Immediate actions upon suspected key compromise
[G/C]Temporary funds-freezing procedures[ALL]Emergency funds transfer to pre-established secure address[G]Post-incident analysis documentation requirements
7.3 Inheritance Execution
7.3.1 Death or Incapacitation Protocol [ALL]
- Heir notification procedures
[G]Authentication procedures for heirs[C/B]Graduated access based on circumstances[ALL]Legal documentation requirements for heirs
7.3.2 Multi-party Recovery [G/C]
- Coordination procedures for distributed recovery teams
[G]Time-locked recovery options[C]Trusted party verification protocol[ALL]Communication security during recovery operations
Phase 8: Key Transfer Procedures
8.1 Planned Key Transfer
8.1.1 Transfer Triggers and Authorization [NEW]
- Define conditions warranting key transfer (retirement, role change, security update)
- Establish authorization chain for approving key transfers
- Document verification procedures for transfer authorization
[ALL]Create transfer approval documentation template
8.1.2 Peaceful Transfer Protocol [NEW]
- Pre-Transfer Preparation:
- Schedule key transfer during low-risk operational periods
- Verify availability of all required parties
- Prepare new hardware and backup materials
[G/C]Pre-verify identities of all participants
- Execution Process:
- Gather required signatories in secure location
- Generate new keys following Phase 2 procedures
- Create new multisig wallet with both old and new keys
- Transfer funds with M+1 signatures (where M is threshold)
[G]Mathematically verify successful transfer[C/B]Confirm transaction on multiple devices
- Post-Transfer Verification:
- Test new wallet configuration with small transaction
- Verify all backup materials are functional
- Document completed transfer with signatures from all parties
[G]Securely destroy obsolete key material
8.1.3 Custodian Training [NEW]
- Comprehensive knowledge transfer to new key custodians
[ALL]Protocol familiarization requirements- Hands-on emergency simulation with new key holders
[G/C]Security awareness training for new custodians[ALL]Documentation review and acknowledgment
8.2 Emergency Key Transfer
8.2.1 Non-Peaceful Transfer Contingencies [NEW]
- Scenarios Requiring Emergency Transfer:
- Custodian becoming uncooperative or unreachable
- Suspected insider threat or coercion
- Legal disputes affecting custodian reliability
- Unexpected custodian incapacitation or termination
[G]Response to potential duress situations
- Emergency Authorization Procedure:
- Define emergency approval threshold (e.g., board vote, designated security team)
- Document evidence requirements for emergency transfer
[G/C]Third-party verification requirements[ALL]Legal consultation requirements
8.2.2 Adversarial Transfer Protocol [NEW]
- Custodian Exclusion Procedure:
[ALL]Transfer funds to pre-established contingency wallet[G]Time-locked security measures activation[C/B]Rapid key rotation with remaining custodians[ALL]Legal documentation of uncooperative party exclusion
- Security Containment:
- Immediate revocation of access to all backup locations
[C/B]Physical security enhancement at storage sites- Change of access credentials for all related systems
[B]Temporary monitoring increase for affected addresses
8.2.3 Post-Adversarial Reconstruction [NEW]
- Complete security review of all affected systems
[G]Full key-material replacement protocol[C]Hardware replacement considerations[ALL]Legal and compliance documentation[ALL]Incident analysis and protocol improvement
8.3 Organizational Transition Management
8.3.1 Governance Structure Changes [NEW]
- Procedures for adapting key custody during:
- Mergers and acquisitions
- Major organizational restructuring
- Regulatory status changes
[G/C]Change in security posture or threat model
- Transition Planning:
- Security continuity requirements during transition
- Staged transfer approach for minimal operational impact
[G]Mathematical verification of security maintenance[C/B]Hardware and software upgrade coordination
8.3.2 Documentation Transfer [NEW]
- Secure transfer of all protocol documentation
[ALL]Update authorized personnel listings- Transfer history and incident logs
[G]Protocol version control and update history[ALL]Updated contact information and procedures
8.3.3 External Verification [NEW]
[G/C]Third-party security audit after major transitions[ALL]Regulatory notification requirements if applicable- Attestation procedure for completed transition
[ALL]Update succession planning documentation
Phase 9: Protocol Maintenance and Evolution
9.1 Regular Review Procedures
9.1.1 Scheduled Protocol Audits [NEW]
- Annual security review of entire protocol
[ALL]Update procedures based on evolving best practices[C/B]Technology upgrade assessment[G]Mathematical verification review
9.1.2 Threat Model Updates [NEW]
- Regular reassessment of threat landscape
[G/C]Quantum computing readiness assessment[ALL]Update security measures based on new threats- Protocol version control and changelog maintenance
9.2 Technological Adaptation
9.2.1 Bitcoin Protocol Updates [ALL]
- Procedure for assessing relevance of Bitcoin upgrades
[C/B]Soft fork adaptation procedures[G]Hard fork contingency planning[ALL]Testing environment for protocol changes
9.2.2 Hardware and Software Evolution [ALL]
- Criteria for hardware wallet replacement
[C/B]Software update verification procedures[G]Legacy system maintenance considerations[ALL]Cross-compatibility testing requirements
9.3 Knowledge Preservation
9.3.1 Documentation Standards [ALL]
- Procedures for maintaining and updating all documentation
[G]Version control for all protocol documents[C/B]Plain language summaries for key procedures[ALL]Accessibility considerations for all documentation
9.3.2 Training and Succession [NEW]
- Regular training schedule for all custodians
[ALL]Cross-training requirements to prevent single points of failure[G/C]Security awareness updates[ALL]Succession planning requirements for all key roles
Appendices
Appendix A: Key Transfer Checklists
A.1 Planned Transfer Checklist
- Authorization documentation requirements
- Pre-transfer security verification steps
- Transfer execution procedure
- Post-transfer verification requirements
- Documentation and cleanup procedures
A.2 Emergency Transfer Checklist
- Emergency authorization procedure
- Security containment steps
- Fund security measures
- Documentation requirements
- Post-emergency review procedure
Appendix B: Transfer Authorization Templates
B.1 Planned Transfer Authorization
- Authorization request template
- Approval documentation template
- Custodian acknowledgment forms
- Transfer completion certification
B.2 Emergency Transfer Authorization
- Emergency declaration template
- Expedited approval procedure
- Evidence documentation requirements
- Post-emergency reporting template

