Back to Blog
crypto inheritancecryptocurrency estate planningbitcoin inheritanceseed phrase backupdigital asset succession

How to Create a Crypto Inheritance Plan (Without a Lawyer)

AK
Abel Kuruvilla
14 min read
Share on X
How to Create a Crypto Inheritance Plan (Without a Lawyer)

How to Create a Crypto Inheritance Plan (Without a Lawyer)

A crypto inheritance plan is a documented system that ensures your cryptocurrency holdings can be accessed by your chosen beneficiaries after your death or incapacitation, without requiring a lawyer, a court order, or the cooperation of any exchange. The plan combines secure key management, dead man's switch triggers, and threshold cryptography to transfer access while preventing premature exposure of your private keys.

The $68 Billion Problem

An estimated $68 billion in Bitcoin alone is considered permanently lost. Chainalysis research suggests roughly 20% of all existing Bitcoin has not moved in over a decade and may be inaccessible. While some of these are early holders choosing not to sell, a significant portion belongs to people who died without leaving their private keys to anyone.

This problem is unique to cryptocurrency. Traditional financial assets (bank accounts, brokerage accounts, real estate) pass through established legal processes: wills, probate, beneficiary designations, transfer-on-death provisions. These systems are slow and bureaucratic, but they work. When a bank account holder dies, the bank doesn't destroy the money. The legal system eventually routes it to the right people.

Cryptocurrency has no such fallback. If the private keys are lost, the funds are lost. There is no customer support to call, no court order that can compel a blockchain to transfer funds, and no regulatory body that can intervene. The decentralization that makes cryptocurrency censorship-resistant also makes it inheritance-hostile by default.

Every crypto holder who dies without an inheritance plan is running an involuntary experiment in permanent wealth destruction.

Existing Approaches to Crypto Inheritance

Several strategies exist for passing cryptocurrency to heirs. Each has trade-offs between security, complexity, and reliability.

1. Multisig Wallets

A multisig (multi-signature) wallet requires M of N signatures to authorize a transaction. For example, a 2-of-3 multisig requires any 2 of 3 designated key holders to sign before funds can move.

How it works for inheritance: You create a multisig wallet where you hold one key, a trusted family member holds another, and a third is stored securely (safety deposit box, attorney's office, hardware device in a separate location). After your death, the family member and the third key location provide 2 of 3 signatures.

Strengths:

  • Native to the blockchain; no third-party system needed.
  • Keys can be distributed geographically.
  • Well-understood technology with broad wallet support.

Weaknesses:

  • Requires heirs to understand multisig transaction signing, which is technically demanding.
  • Key holders must maintain their keys over years or decades.
  • No automated detection of the holder's death; someone must decide to initiate the transfer.
  • Does not work uniformly across all blockchains (different multisig standards).
  • Setup is complex and error-prone for non-technical users.

2. Social Recovery Wallets

Social recovery wallets (popularized by Vitalik Buterin and implemented in wallets like Argent) allow designated "guardians" to approve recovery of a wallet if the owner loses access or becomes incapacitated.

How it works for inheritance: You designate guardians (family, friends, institutions). If a majority of guardians agree, they can transfer wallet control to a new address controlled by your heir.

Strengths:

  • Guardians don't need to hold private keys directly.
  • Recovery process is built into the wallet UX.
  • Guardians can be changed over time.

Weaknesses:

  • Currently limited to specific wallet implementations and mostly Ethereum-based.
  • Guardians must be reachable and willing to participate.
  • No built-in dead man's switch; someone must initiate recovery.
  • Guardians could collude to steal funds (same threshold risk as any M-of-N scheme).

3. Seed Phrase Splitting (Manual)

The most common DIY approach: write down your seed phrase (the 12 or 24 words that generate your private keys) and split it among trusted people or locations.

How it works for inheritance: You split the 24-word seed phrase into parts. For example, words 1-8 go to Person A, words 9-16 to Person B, and words 17-24 to Person C. All three must combine their parts to reconstruct the full phrase.

Strengths:

  • No technology required. Works with paper and pen.
  • Easy to understand conceptually.

Weaknesses:

  • This approach is fundamentally insecure. A partial seed phrase drastically reduces the search space for the remaining words. With 16 of 24 words, the remaining 8 can be brute-forced in minutes on modern hardware.
  • Requires all parts to be present. If one person loses their part, the funds are permanently lost.
  • No redundancy: it's an N-of-N scheme (all parts required), not a K-of-N scheme (threshold).
  • No automated trigger. Someone must decide to reassemble the phrase.

4. Shamir's Secret Sharing (Cryptographic Splitting)

Instead of naively splitting a seed phrase, Shamir's Secret Sharing splits it mathematically so that any K of N shares can reconstruct the secret, but K-1 shares reveal zero information.

How it works for inheritance: Your seed phrase (or wallet encryption key) is split into, say, 5 shares with a threshold of 3. Five trusted people each receive one share. When you die, any 3 can reconstruct the seed phrase. Two shares reveal nothing.

Strengths:

  • Mathematically proven security (information-theoretic, not just computational).
  • Flexible threshold: K-of-N configurable.
  • Tolerates loss of N-K shares.
  • Each individual share is useless on its own.

Weaknesses:

  • Requires software to split and reconstruct (not paper-compatible in raw form; SLIP-39 standardizes this for seed phrases).
  • No built-in trigger mechanism. Shareholders must decide when to combine.
  • Share distribution and management still require planning.

5. Dead Man's Switch with Encrypted Storage

A dead man's switch monitors whether you're alive (via periodic check-ins) and automatically initiates a transfer process if you stop responding.

How it works for inheritance: You store your encrypted documents (including seed phrases, wallet files, or instructions) in the system. You configure liveness checks. If you miss enough checks, the system notifies your survivors and gives them the means to decrypt your documents, typically using threshold cryptography.

Strengths:

  • Automated detection of death or incapacitation.
  • No one needs to decide "now is the time to act."
  • Can store any type of document, not just seed phrases.
  • Combines dead man's switch with threshold crypto for dual protection.
  • Multi-channel notifications ensure survivors are reached.

Weaknesses:

  • Requires trust in the system operator (mitigated by self-hosting and open-source code).
  • Requires the system to remain operational until triggered.
  • Check-in fatigue: you must continue responding to periodic pings indefinitely.

Approach Comparison

FeatureMultisigSocial RecoveryManual SplitShamir (SLIP-39)Dead Man's Switch + Shamir
Automated death detectionNoNoNoNoYes
Threshold access (K-of-N)YesYesNo (all-or-nothing)YesYes
Cross-chain supportLimitedLimitedYes (seed phrases)Yes (seed phrases)Yes (any document)
Technical skill requiredHighMediumLowMediumLow
Stores non-crypto dataNoNoNoNoYes
Self-hostableN/A (on-chain)No (wallet-specific)N/A (paper)Yes (offline tools)Yes
Survives platform shutdownYes (on-chain)NoYes (paper)Yes (offline)Depends on implementation
Share security if partially exposedN/AN/AWeak (brute-forceable)Provably secureProvably secure
Multi-channel notificationsNoNoNoNoYes

Step-by-Step: Creating Your Crypto Inheritance Plan

The following process combines the strengths of multiple approaches into a practical plan. It uses a dead man's switch with Shamir's Secret Sharing as the primary mechanism, supplemented by offline backups.

Step 1: Inventory Your Holdings

Create a complete list of your cryptocurrency holdings:

  • Self-custody wallets: List each wallet, the blockchain(s) it covers, approximate holdings, and where the seed phrase is currently stored.
  • Exchange accounts: List each exchange, what assets are held there, and whether you have withdrawal access or any restrictions.
  • DeFi positions: List any staked assets, liquidity pool positions, lending positions, or governance tokens.
  • Hardware wallets: List each device, what it secures, and where it's physically stored.
  • Other digital assets: NFTs, domain names held as NFTs, ENS names, and similar.

This inventory is the document you will encrypt and protect. It should include enough information for a technically competent person to locate and recover every asset.

Step 2: Consolidate Where Possible

Reduce complexity by consolidating holdings:

  • Move exchange-held crypto to self-custody wallets where practical. Exchange accounts require account recovery processes that may be inaccessible to heirs.
  • Reduce the number of wallets. Fewer wallets mean fewer seed phrases to protect.
  • Convert minor altcoin positions to major assets if you don't actively manage them.

The goal is to minimize the number of secrets your heirs need to manage.

Step 3: Create Your Inheritance Document

Write a clear, detailed document that includes:

  • Your complete inventory from Step 1.
  • Seed phrases for each self-custody wallet.
  • Passwords or PINs for hardware wallets.
  • Exchange account credentials (email, password, 2FA recovery codes).
  • Step-by-step instructions for recovering each asset, written for someone who may not be deeply familiar with cryptocurrency.
  • Contact information for anyone who might need to help (a crypto-savvy friend, an accountant, a specific exchange's support).
  • Any time-sensitive information (staked assets with lock periods, loans with liquidation thresholds).

Step 4: Encrypt and Store

This is where the dead man's switch system comes in. Using a tool like Burning Ash Protocol:

  1. Upload your inheritance document to the encrypted will. Documents are encrypted with AES-256-GCM using a per-will Data Encryption Key (DEK).

  2. Add your Survivors. These are the people who will receive access after your death or incapacitation.

  3. Set the threshold. Configure how many survivors must cooperate to decrypt the documents. For a family of 5, a 3-of-5 threshold is common. The DEK is split into 5 shares using Shamir's Secret Sharing.

  4. Configure liveness checks. Set the check-in interval (how often you're pinged), the response window (how long you have to respond), and the escalation count (how many missed checks trigger the transfer). For crypto holdings, a shorter interval (weekly or biweekly) is appropriate given the potential financial urgency.

  5. Set up notification channels. Configure how survivors are notified when the transfer triggers. Use multiple channels (email + SMS, or email + Telegram) for redundancy.

Step 5: Create Offline Backups

A dead man's switch system is a primary mechanism, but offline backups provide resilience against system failure:

  • SLIP-39 shares: For your most critical wallets, generate SLIP-39 Shamir backup shares using a compatible hardware wallet (Trezor Model T supports this natively). Distribute physical copies of these shares to the same people designated as survivors in your digital system.

  • Sealed instructions. Give your primary heir a sealed envelope explaining that a dead man's switch system exists, what to expect when it triggers, and how to verify their identity to receive their key share. This envelope does not contain any secrets; it only contains instructions.

  • Attorney notification. If you have an attorney, inform them that a digital inheritance system is in place and provide basic instructions for your heirs to follow. The attorney does not need access to the system itself.

Step 6: Test the System

Before considering your plan complete:

  • Verify that all survivors can receive notifications through their configured channels.
  • Confirm that your check-in mechanism works (respond to a test check-in).
  • Walk at least one survivor through the process: "When you receive a notification, here's what you do."
  • Verify that your inheritance document is accurate by checking it against your actual holdings.

Step 7: Schedule Maintenance

Set a recurring reminder (quarterly or semi-annually) to:

  • Update the inheritance document if holdings have changed.
  • Verify survivor contact information is current.
  • Check that exchange accounts are still accessible and 2FA is functional.
  • Review and adjust the threshold if your survivor list has changed.
  • Respond to check-ins (obviously, but worth noting: if you let a check-in lapse accidentally, it can trigger a false alarm).

Security Considerations for Crypto Specifically

Cryptocurrency inheritance has unique security requirements that don't apply to traditional digital assets:

Irreversibility

Crypto transactions are irreversible. If an unauthorized party gains access to your inheritance document and moves your funds, there is no chargeback, no fraud department, and no recovery. This makes the security of your inheritance plan not just a convenience issue but a direct financial risk.

Mitigation: Threshold cryptography (Shamir's Secret Sharing) ensures no single compromised survivor can access the document. The check-in mechanism prevents premature triggering.

Time Sensitivity

Unlike a bank account that sits safely during probate, cryptocurrency holdings can be at risk:

  • Staked assets may have unbonding periods that must be initiated.
  • DeFi positions may face liquidation if market conditions change and no one manages them.
  • Exchange accounts may be frozen or restricted if too much time passes.

Mitigation: Shorter check-in intervals (weekly) for active DeFi participants. Include specific instructions for time-sensitive positions in the inheritance document.

Technical Complexity

Your heirs may not understand cryptocurrency. The inheritance document must be detailed enough for a non-expert to follow, or it must identify a technically competent person who can assist.

Mitigation: Write instructions at the level of someone who has never used a cryptocurrency wallet. Include screenshots if possible. Designate a "technical executor" among your survivors who is comfortable with crypto operations.

Network Fees and Access

Recovering cryptocurrency may require native tokens for gas fees (ETH for Ethereum transactions, BTC for Bitcoin fees). If your heirs don't hold any crypto themselves, they may need to acquire some to pay fees for moving your assets.

Mitigation: Include a small amount of the native gas token in an easily accessible format (a simple wallet with a low-value balance and the key included in the inheritance document) so heirs can pay transaction fees immediately.

What Not to Do

Several common approaches to crypto inheritance are actively dangerous:

  • Don't store seed phrases in a regular cloud drive. Google Drive, iCloud, and Dropbox are not designed for secret storage. A compromised account means compromised funds.
  • Don't email seed phrases to yourself or anyone else. Email is not encrypted end-to-end (in most configurations) and persists indefinitely on servers you don't control.
  • Don't naively split seed phrases. As covered earlier, splitting a 24-word seed phrase into parts creates a weak, brute-forceable system. Use Shamir's Secret Sharing instead.
  • Don't rely solely on a single hardware device. Hardware wallets fail, get lost, or become obsolete. The seed phrase backup is the actual backup, not the device.
  • Don't assume exchanges will cooperate. Exchange inheritance processes are slow, require legal documentation, and are not guaranteed to succeed. Self-custody with a proper inheritance plan is more reliable.
  • Don't tell no one. The best inheritance plan in the world is useless if your family doesn't know it exists. At least one person must know that a plan is in place and where to find the instructions.

Doing This Without a Lawyer

This guide deliberately avoids requiring legal counsel, because the cryptographic mechanisms described here operate independently of legal systems. Shamir's Secret Sharing doesn't need a court order. A dead man's switch doesn't need a probate judge.

However, there are situations where legal advice adds value:

  • If your estate is large enough to trigger estate tax obligations.
  • If you have beneficiaries in multiple jurisdictions with different inheritance laws.
  • If there are potential disputes among heirs about who should receive what.
  • If you want to integrate your crypto inheritance plan with a traditional will or trust.

For most individuals, the technical plan described in this guide is sufficient to ensure your cryptocurrency is accessible to your chosen heirs. The plan doesn't require a lawyer to create, maintain, or execute. It requires only that you take the time to set it up and keep it current.

Related Articles