The Complete Guide to Digital Wills in 2026
The Complete Guide to Digital Wills in 2026
The average person manages over 100 online accounts, holds cryptocurrency, stores irreplaceable photos in the cloud, and runs businesses through digital platforms. When that person dies, their digital life does not die with them. It lingers in a state of limbo — inaccessible to the people who need it most.
A digital will solves this problem. It is a structured, secure document that tells your designated beneficiaries exactly what digital assets you own, how to access them, and what you want done with each one after you are gone.
This guide covers everything you need to know about digital wills in 2026: what they are, how they differ from traditional wills, their legal standing across major jurisdictions, what to include, how encryption protects them, and how to set one up.
What Is a Digital Will?
A digital will is a secure document or set of instructions that specifies how your digital assets should be managed, transferred, or destroyed after your death or incapacitation. Unlike a traditional will that handles physical property and financial accounts through probate, a digital will addresses online accounts, encrypted files, cryptocurrency wallets, cloud storage, social media profiles, and other assets that exist only in digital form.
The concept is straightforward: you write down what you own digitally, who should receive it, and how they can access it. The execution, however, is where things get complicated. Digital assets are protected by passwords, two-factor authentication, encryption keys, and terms of service agreements that do not automatically transfer upon death. A digital will must account for all of these barriers.
Digital wills are not a replacement for traditional estate planning. They are a necessary supplement. A traditional will might say "my daughter inherits my financial accounts," but without the credentials, recovery codes, and access instructions contained in a digital will, that inheritance can be functionally unreachable.
Who Needs a Digital Will?
If you have any of the following, you need a digital will:
- Online financial accounts: Banking, investment, retirement, or payment platforms
- Cryptocurrency holdings: Bitcoin, Ethereum, or any tokens stored in wallets
- Cloud storage: Google Drive, Dropbox, iCloud, or self-hosted storage containing important documents or media
- Business assets: Domains, hosting accounts, SaaS subscriptions, admin credentials for business-critical tools
- Social media accounts: Profiles on platforms like Facebook, Instagram, X, LinkedIn, or YouTube with sentimental or monetary value
- Digital subscriptions: Streaming services, software licenses, recurring payments that should be cancelled
- Intellectual property: Code repositories, creative works, unpublished writing, or digital art (including NFTs)
In short, almost everyone in 2026 needs one.
Digital Will vs. Traditional Will
A traditional will is a legal document, typically drafted with an attorney, that specifies how your physical and financial assets are distributed after death. It goes through probate — a court-supervised process that validates the will and oversees distribution. Traditional wills handle real estate, vehicles, bank accounts, and personal property.
A digital will operates in a fundamentally different space. Digital assets are not governed by the same probate processes, and many are controlled by platform-specific terms of service rather than inheritance law. Here is how the two compare:
| Aspect | Traditional Will | Digital Will |
|---|---|---|
| Assets covered | Physical property, financial accounts, real estate | Online accounts, crypto wallets, cloud storage, digital files |
| Legal framework | Probate law, well-established precedent | Varies by jurisdiction; evolving legislation |
| Access mechanism | Court order, executor authority | Passwords, encryption keys, recovery codes |
| Creation process | Attorney-drafted, witnesses required | Self-created or tool-assisted, encryption recommended |
| Update frequency | Major life events (marriage, birth, property) | Every time you create a new account or change a password |
| Security model | Physical document in safe or with attorney | Encrypted storage with controlled access |
| Transfer trigger | Death certificate filed with probate court | Manual discovery, or automated via dead man's switch |
| Platform cooperation | Banks legally required to comply | Platforms have their own policies; some resist disclosure |
| Cost | $300-$1,500+ for attorney drafting | Free to $50/year for digital will services |
The key difference is operational: a traditional will tells a court what to do, while a digital will tells your survivors how to actually do it. Both are necessary.
Legal Standing of Digital Wills
The legal landscape for digital wills is evolving rapidly. No jurisdiction treats a standalone digital will as a complete replacement for a traditional will, but most now have legislation that addresses digital asset access after death.
United States
The United States has made the most progress through the Revised Uniform Fiduciary Access to Digital Assets Act (RUFADAA), which has been adopted in some form by 49 states and the District of Columbia as of 2025. RUFADAA establishes a priority hierarchy for digital asset access:
- Online tool directions (highest priority): If the deceased used a platform's built-in tool to designate a beneficiary (like Google's Inactive Account Manager or Facebook's Legacy Contact), that takes precedence.
- Will or trust provisions: If the will specifically addresses digital assets or grants fiduciary access, that comes next.
- Terms of service (lowest priority): The platform's ToS applies only if neither of the above exists.
RUFADAA does not make a digital-only will legally valid for probate purposes. You still need a traditional will that meets your state's execution requirements (typically written, signed, and witnessed). However, a digital will can be referenced by or attached to a traditional will as a supplementary document.
For cryptocurrency specifically, the IRS treats crypto as property, meaning it is subject to estate tax and must be reported. Without the private keys or seed phrases documented in a digital will, this property can become permanently inaccessible — a loss that the estate still owes taxes on.
United Kingdom
The UK does not yet have RUFADAA-equivalent legislation. Digital assets are covered under the general framework of the Wills Act 1837 (as amended) and the Administration of Estates Act 1925, but these were written long before digital assets existed.
In practice, UK executors face significant friction accessing digital accounts. The Law Commission published a consultation paper in 2024 recommending updates to succession law to explicitly address digital assets, but legislation has not yet been enacted. Current best practice in the UK is to:
- Include digital asset provisions in a traditional will
- Create a separate letter of wishes (not legally binding but practically useful) listing digital accounts and access methods
- Use a digital will tool that encrypts and securely stores the detailed access instructions
European Union
The EU's approach is fragmented by member state. The General Data Protection Regulation (GDPR) complicates digital inheritance because it protects the privacy of the deceased's communications and data. France's Loi pour une Republique Numerique (2016) is the most progressive, giving individuals the right to set directives for their personal data after death.
Germany treats digital accounts as inheritable assets, following a landmark 2018 Federal Court of Justice ruling that granted parents access to their deceased daughter's Facebook account. This precedent has influenced other EU member states, but enforcement varies.
The EU's Data Act (effective September 2025) includes provisions for data portability that may indirectly support digital estate transfer, but it does not directly address post-mortem access.
Australia
Australia has no federal legislation specifically addressing digital assets in wills. Each state and territory has its own succession law, and none explicitly cover digital assets. The NSW Law Reform Commission and Victorian Law Reform Commission have both recommended legislative updates, but these have not been enacted.
Australian practitioners recommend including a digital asset clause in your traditional will and maintaining a separate, encrypted document with access details. The Australian Banking Association's guidelines require banks to provide account access to executors with a death certificate and grant of probate, but tech platforms operating from overseas are not bound by Australian succession law.
Practical Takeaway
Regardless of jurisdiction, the safest approach in 2026 is threefold:
- Include a digital asset clause in your traditional, legally valid will
- Create a comprehensive digital will with account details, credentials, and instructions
- Encrypt the digital will and establish a secure transfer mechanism (such as a dead man's switch) so that your beneficiaries can access it when needed
What to Include in Your Digital Will
A thorough digital will covers every digital asset you own, organized by category, with the access credentials and your instructions for each. The following checklist is comprehensive — not every item will apply to everyone, but reviewing each category ensures nothing is overlooked.
Financial Accounts
- Online banking logins (each institution)
- Investment platform credentials (brokerage accounts, robo-advisors)
- Retirement account access (if managed online)
- Payment services (PayPal, Venmo, Wise, Revolut)
- Cryptocurrency wallets: wallet addresses, private keys, seed phrases, hardware wallet PINs and locations
- DeFi positions: staking, liquidity pools, lending protocols, and the wallet addresses involved
- Tax software accounts and filed returns
Communication and Social
- Email accounts (personal and professional) with passwords and 2FA recovery codes
- Social media profiles: Facebook, Instagram, X, LinkedIn, TikTok, YouTube, Reddit
- Instructions per platform: memorialize, delete, or transfer to a specific person
- Messaging apps: WhatsApp, Signal, Telegram — especially any that contain important conversations or shared media
Cloud Storage and Files
- Cloud storage accounts: Google Drive, Dropbox, OneDrive, iCloud
- Self-hosted storage: NAS credentials, server access, SSH keys
- Important documents stored digitally: scanned IDs, contracts, insurance policies
- Photo and video libraries: locations, backup status, who should receive them
Business and Professional
- Domain registrar credentials
- Web hosting and server access (SSH keys, control panel logins)
- Business email and collaboration tools (Google Workspace, Microsoft 365 admin)
- Code repositories (GitHub, GitLab) and deployment credentials
- SaaS admin accounts for business-critical tools
- Client data and obligations: what needs to be handed off, what needs to be deleted
- Advertising accounts (Google Ads, Meta Business)
Subscriptions and Recurring Payments
- Streaming services to cancel
- Software subscriptions to cancel or transfer
- Recurring donations to continue or stop
- Auto-renewing domains and hosting
Hardware and Physical Access
- Device passwords and PINs (phone, laptop, tablet)
- Hardware security keys (YubiKey locations)
- Hardware wallet locations and PINs
- Safe or lockbox combinations (for devices or backup drives stored physically)
- Backup drive locations and encryption passwords
Instructions and Wishes
- Per-account instructions: transfer, archive, memorialize, or delete
- Any accounts that should be deleted immediately (privacy-sensitive)
- Messages to be delivered to specific people
- Digital creative works: licensing wishes, publication instructions
- Data that should be permanently destroyed
Keeping It Current
A digital will is only useful if it is accurate. Set a recurring reminder — quarterly is ideal, biannually at minimum — to review and update your digital will. Major triggers for immediate updates:
- New financial account or cryptocurrency wallet
- Changed passwords or enabled new 2FA methods
- New business venture or domain registration
- Marriage, divorce, birth, or death in the family
- New hardware wallet or security key
How Encryption Protects Your Digital Will
A digital will contains the most sensitive information you own: every password, every financial credential, every private key. Storing this unencrypted — in a Google Doc, a notes app, or a printed sheet of paper — creates a catastrophic single point of failure. If anyone accesses it while you are alive, they have the keys to your entire digital life.
Encryption solves this problem by making the document unreadable without the correct decryption key. But the challenge is circular: how do you give your survivors access to the key only after you are gone, without trusting a single person or service with complete access while you are alive?
AES-256-GCM: The Encryption Standard
The current gold standard for symmetric encryption is AES-256-GCM (Advanced Encryption Standard with 256-bit keys in Galois/Counter Mode). This is the same encryption standard used by governments and financial institutions worldwide, and it is recommended by NIST (National Institute of Standards and Technology) in Special Publication 800-38D.
AES-256-GCM provides two guarantees:
- Confidentiality: The encrypted data is computationally infeasible to decrypt without the key. A 256-bit key has 2^256 possible combinations — brute-forcing it would take longer than the age of the universe with current technology.
- Integrity: GCM mode includes an authentication tag that detects any tampering with the encrypted data. If someone modifies even a single bit of the ciphertext, decryption fails. This prevents an attacker from subtly altering your will without detection.
In a well-designed digital will system, each will is encrypted with its own unique Data Encryption Key (DEK). The DEK is itself encrypted by a master key, creating a two-layer encryption hierarchy. This means compromising one will's DEK does not expose any other will in the system.
Shamir's Secret Sharing: Distributing Trust
The key distribution problem — how to give survivors access to the decryption key only when needed — is solved elegantly by Shamir's Secret Sharing, a cryptographic algorithm published by Adi Shamir in 1979.
Shamir's Secret Sharing works by splitting a secret (in this case, the encryption key) into N shares, where any K shares (the threshold) are sufficient to reconstruct the original secret. Fewer than K shares reveal absolutely no information about the secret — this is not a "partial reveal" situation. It is mathematically provable that K-1 shares provide zero information.
Here is how it works in practice for a digital will:
- You create your digital will and it is encrypted with a DEK
- The DEK is split into, say, 5 shares (N=5) with a threshold of 3 (K=3)
- Each key fragment is distributed to a different Survivor
- When the will needs to be accessed, any 3 of the 5 Survivors combine their key fragments to reconstruct the DEK
- The DEK decrypts the will
This eliminates single points of failure in both directions:
- No single Survivor can access the will alone (you need at least K shares)
- Losing some shares does not lock everyone out (you can lose N-K shares and still reconstruct)
- No central service holds the complete key (the service only holds encrypted data)
The mathematics behind this is based on polynomial interpolation over finite fields. A polynomial of degree K-1 is uniquely determined by K points. The secret is encoded as the polynomial's constant term, and each share is a point on the polynomial. With fewer than K points, infinitely many polynomials fit the data, making the secret information-theoretically secure.
Why This Matters More Than Passwords
Some digital will services simply store your credentials behind a master password and share that password with your executor. This is fundamentally less secure because:
- A single password can be guessed, phished, or brute-forced
- The service (or its employees) can access your data with the master password
- A breach of the service exposes everything
- There is no threshold mechanism — it is all-or-nothing
End-to-end encryption with Shamir's Secret Sharing means that even the service hosting your digital will cannot read it, and no single person or breach can expose your data.
Approaches to Digital Will Storage
There are three broad approaches to storing and managing a digital will. Each has trade-offs in security, accessibility, and maintenance burden.
| Approach | Security | Accessibility | Maintenance | Single Point of Failure | Cost |
|---|---|---|---|---|---|
| Paper/printed | Low (physical theft, fire, water) | Low (must be physically present) | High (manual updates, reprinting) | Yes (one copy = one failure point) | Free |
| Digital unencrypted | Very low (any access = full exposure) | High (cloud-accessible) | Medium (easy to edit) | Yes (account breach = full exposure) | Free |
| Password manager emergency access | Medium (master password is single secret) | Medium (requires specific app/service) | Low (integrated with daily use) | Partial (service-dependent) | $3-6/mo |
| Encrypted with shared access | High (AES-256, Shamir's SSS) | Medium (requires threshold cooperation) | Medium (app-managed) | No (distributed trust) | Free-$4/mo |
Paper-Based Digital Will
The simplest approach: print your credentials, put them in an envelope, store it in a safe or with your attorney. This is better than nothing but has serious limitations. Paper degrades, safes can be inaccessible, and updating requires reprinting everything. More importantly, if the paper is found by the wrong person, there is no encryption — everything is exposed in plaintext.
Password Manager Emergency Access
Services like 1Password and Bitwarden offer emergency access features where a designated contact can request access to your vault. After a configurable waiting period (during which you can deny the request if you are still alive), access is granted. This is convenient but has limitations: it relies on the password manager service remaining operational, the designated contact must use the same service, and the entire vault is shared rather than specific items.
Encrypted Digital Will with Threshold Access
This is the most secure approach, used by purpose-built tools like Burning Ash Protocol. Your will is encrypted end-to-end, the encryption key is split among multiple Survivors using Shamir's Secret Sharing, and access is only granted when a threshold of Survivors cooperate — typically triggered by a dead man's switch that detects your inactivity.
The advantage is defense in depth: the hosting service cannot read your will, no single Survivor can access it alone, and the automated trigger mechanism removes the need for someone to manually initiate the process.
How to Set Up a Digital Will with Burning Ash Protocol
Burning Ash Protocol (BAP) is an open-source, encrypted digital will platform that implements the security model described above. It is available as a self-hosted deployment (Docker with Go API and Next.js frontend) or as a managed SaaS service. Here is how to set up your digital will using BAP.
Step 1: Create Your Account
Sign up at baprotocol.com for the managed service, or deploy your own instance using the self-hosting guide on GitHub. Self-hosted deployments run on Docker with SQLite (development) or PostgreSQL (production).
If self-hosting, you generate your own MASTER_KEY and JWT_SECRET using openssl rand -hex 32. The master key encrypts your Data Encryption Keys — it never leaves your server.
Step 2: Configure Your Will
From the dashboard, create a new will. You can upload documents, write instructions, and add credentials. Everything you enter is encrypted with a unique DEK before it is stored. The DEK is encrypted with the master key, creating a two-layer encryption model.
Include the categories from the checklist above: financial accounts, communication accounts, cloud storage, business assets, subscriptions, hardware access, and your specific instructions for each.
Step 3: Designate Your Survivors
Add your Survivors — the people who should receive access to your will. For each Survivor, provide their name and a contact method (email, phone number, or messaging handle). BAP supports multi-channel notification via Email, SMS, WhatsApp, and Telegram.
Configure the Shamir's Secret Sharing parameters:
- Total shares (N): The number of Survivors who receive a key fragment
- Threshold (K): The minimum number of Survivors who must cooperate to decrypt the will
A common configuration is 3-of-5: five Survivors each hold a key fragment, and any three can reconstruct the key. Choose a threshold that balances security (higher K = harder for a subset to collude) against availability (lower K = more resilient to unresponsive Survivors).
Step 4: Set Up Liveness Checks
Configure the dead man's switch that will trigger will transfer if you become unresponsive:
- Host Check-In Interval (HCIT): How often BAP checks if you are alive (e.g., every 7 days)
- Host Check-In Response Time (HCRT): How long you have to respond to each check (e.g., 48 hours)
- Host Check-In Response Action Count (HCRAC): How many consecutive missed checks trigger the transfer (e.g., 3 missed checks)
With these example settings, the system pings you weekly. If you miss three consecutive checks over roughly a month, it initiates the Will Transfer Protocol. See our dead man's switch guide for detailed configuration advice.
Step 5: Configure Notification Channels
Set up how Survivors are notified when the will transfer is triggered. BAP supports:
- Email: SMTP-based delivery (platform-managed on SaaS, or bring your own SMTP credentials on self-hosted/Pro)
- SMS: Via Twilio integration
- WhatsApp: Via Twilio or WhatsApp Business API
- Telegram: Via Telegram Bot API
Configure at least two channels per Survivor for redundancy. Notification channels are also used for your own liveness check prompts.
Step 6: Test and Verify
Before considering your digital will complete:
- Verify each Survivor has received their initial notification and understands their role
- Confirm your liveness check notifications are arriving on your configured channels
- Review the will contents for completeness against the checklist above
- Set a calendar reminder to review and update quarterly
Common Mistakes in Digital Estate Planning
Even people who take the initiative to create a digital will often make critical errors. These are the most common.
Storing Credentials in Plaintext
Writing passwords in a spreadsheet, a notes app, or an unencrypted document is the most common and most dangerous mistake. If anyone — a hacker, a disgruntled employee, a curious family member — accesses that document, they have everything. Use encryption.
Naming a Single Point of Contact
Giving one person all your credentials creates a single point of failure in both directions: if that person is compromised, so are you; if that person is unavailable when needed, no one can access anything. Distribute trust using threshold-based sharing.
Forgetting to Update
A digital will created in 2024 and never updated is almost as dangerous as no digital will at all. Changed passwords, closed accounts, new crypto wallets, and new two-factor authentication methods all render old instructions useless. Automate reminders and review regularly.
Ignoring Platform-Specific Policies
Each platform has its own post-mortem access policy. Google has Inactive Account Manager. Facebook has Legacy Contact and memorialization. Apple has Digital Legacy. Ignoring these built-in tools means missing the easiest path to access. Configure them in addition to your digital will.
Not Telling Anyone the Will Exists
An encrypted, perfectly maintained digital will is useless if nobody knows it exists. At minimum, tell your executor, your closest family member, and your attorney that you have a digital will and how to trigger the access process.
Overcomplicating the Threshold
Setting a Shamir's Secret Sharing threshold too high (e.g., 5-of-5) means that if even one Survivor is unreachable, the will is permanently locked. Set the threshold high enough for security but low enough for practical recovery. For most people, 2-of-3 or 3-of-5 is appropriate.
Neglecting Physical Security
Your hardware wallet, YubiKey, phone, and laptop are part of your digital estate. If they are locked with biometrics and PINs that nobody knows, they are inaccessible. Include physical device access instructions in your digital will, and consider where these devices are physically stored.
Frequently Asked Questions
Is a digital will legally binding?
A standalone digital will is not a substitute for a traditional will in any major jurisdiction. However, it serves as a critical supplementary document. Most estate planning attorneys recommend including a digital asset clause in your traditional will that references your digital will. Under RUFADAA (adopted in 49 US states), digital asset directions in a valid will are legally recognized.
How is a digital will different from a password manager?
A password manager stores your credentials for daily use. A digital will is specifically designed for post-mortem or incapacitation access, with features like dead man's switch triggers, threshold-based decryption, and designated Survivor management. Some password managers offer basic emergency access, but they lack the granular control, multi-party verification, and automated triggering of a purpose-built digital will platform.
What happens to my cryptocurrency if I die without a digital will?
Without documented access to your private keys or seed phrases, your cryptocurrency is effectively lost forever. Unlike bank accounts, there is no institution that can be compelled by a court to grant access. The coins remain on the blockchain, permanently inaccessible. This has already resulted in billions of dollars of permanently lost Bitcoin.
Can I use a digital will for my business?
Yes, and you should. Business continuity planning should include documentation of all administrative credentials, service accounts, deployment pipelines, domain registrations, and vendor relationships. A digital will ensures that if a key technical leader is incapacitated, the business can continue operating without a catastrophic loss of access.
How often should I update my digital will?
Review quarterly at minimum. Update immediately when you create new financial accounts, change passwords on critical services, acquire cryptocurrency, change two-factor authentication methods, or experience a major life event (marriage, divorce, birth, new business).
What if I do not trust any single cloud service with my data?
Self-host your digital will platform. Open-source tools like Burning Ash Protocol can be deployed on your own infrastructure using Docker. Your data never touches a third-party server, and you control the master encryption key. The trade-off is that you are responsible for uptime, backups, and maintenance — but for high-security use cases, this is the right choice.
Can Survivors collude to access my will while I am alive?
With a properly configured dead man's switch, the will transfer process only begins after you fail multiple liveness checks. Even if Survivors hold enough key fragments to meet the threshold, they cannot use those key fragments until the Will Transfer Protocol is triggered by your confirmed inactivity. Additionally, you are notified at every step and can cancel the process by responding to a liveness check.
What is Shamir's Secret Sharing and why does it matter?
Shamir's Secret Sharing is a cryptographic algorithm that splits a secret into multiple pieces (shares), where a minimum number (threshold) of shares are needed to reconstruct the original. Fewer than the threshold reveals nothing about the secret. For digital wills, this means no single Survivor — and no single service — holds enough information to decrypt your will alone. It is the mathematical foundation of distributed trust.
Conclusion
Digital estate planning is no longer optional. Your digital life contains financial assets, irreplaceable memories, business-critical access, and personal information that your loved ones will need — or need to protect — after you are gone.
A comprehensive digital will, protected by strong encryption and distributed trust, ensures that the right people get access to the right things at the right time. Whether you use a managed service, self-host an open-source solution, or start with a simple encrypted document, the important thing is to start.
Review the checklist in this guide, take inventory of your digital assets, and create your digital will today. Then set a reminder to update it quarterly. Your future self — and your Survivors — will thank you.