Passionate about Bitcoin and convinced that education is the key, I wish to share with you the little knowledge I have and thus contribute to the adoption of Bitcoin. Otherwise, I'm a big fan of Pink Floyd, I'm learning to code, and I make memes. Looking forward to meeting you at the next meet-up! I am the creator of the training course BTC 205 - Non-KYC Purchase Solution.
Why a technical heritage plan is essential
How on-chain inheritance works
Timelocks
Multiple spending paths
- Main path** : The owner can spend his funds at any time with his main key, with no time restrictions.
- Recovery path(s)**: One or more alternative keys can spend funds only after a set time has elapsed.
Miniscript and Taproot
The critical importance of descriptors
wsh(or_d(pk([fingerprint/path]xpub...),and_v(v:pkh([fingerprint/path]xpub...),older(52560))))
wsh(): Witness Script Hash, indicates address type (P2WSH)- or_d()`: "or" condition with a default branch
- pk([fingerprint/path]xpub...)`: The master public key with its fingerprint and derivation path
- and_v()`: "and" condition combining recovery key with timelock
older(52560): The relative time lock of 52560 blocks
Documentary components of an inheritance plan
The letter of inheritance
- Don't rush, take time to learn before moving funds
- Never communicate a complete recovery phrase to a single person
- Never enter a recovery phrase into an unverified software program or computer
- Beware of scams and people offering unsolicited help
- Seek the advice of at least two people you trust before making any decision
The directory of trusted contacts
Bitcoin asset inventory
- Portfolio type**: hardware, software, configuration (single-sig, multisig, legacy)
- Device location**: physical location of wallet hardware
- Descriptor/configuration file location**: critical for advanced wallets
- Location of recovery phrase**: separate from descriptor
- Access codes**: where PINs and passphrases are stored
- Configured delays**: when recovery paths activate
Technical solutions available
Liana
Bitcoin Keeper
Heritage
The heir's recovery process
Recovery requirements
-
The descriptor or configuration file of the original wallet (JSON or text format, depending on the software)
-
Its recovery phrase (the one associated with its inheritance key, usually 12 or 24 words)
-
Compatible software (Liana, Bitcoin Keeper, Heritage, or Sparrow/Specter for standard descriptors)
-
A connection to a Bitcoin node to check timelock status and broadcast the transaction
Recovery steps
-
Install the software on a secure device and configure the connection to the Bitcoin network (personal node or Electrum server)
-
Import the descriptor to reconstruct the wallet structure. The software will automatically generate all addresses used
-
Restore inheritance key from recovery phrase. The software will check that this key corresponds to one of the keys authorized in the descriptor
-
Synchronize wallet to discover all UTXOs and their spending conditions
-
Check timelock expiration: the software will indicate for each UTXO whether the recovery path is active
-
Create the recovery transaction to an address controlled solely by the heir (ideally a new single wallet)
-
Sign and broadcast the transaction on the Bitcoin network
Points to watch for the heir
- Check the authenticity of downloaded software** (checksums, signatures)
- Never share your recovery phrase** with anyone offering help
- Consult at least two people you trust** before carrying out recovery
- Transfer the funds to a simple wallet** that he controls completely after recovery
Best practices
Separation of information
Recovery tests
Timelock maintenance
Plan update
Choosing your approach
Conclusion
Resources
Inheritance plan template
- Bitcoin Inheritance Plan Template (PDF) - Plan ₿ Academy Documentation Template
Technical references
- BIP-65 : OP_CHECKLOCKTIMEVERIFY - Specification of absolute timelocks (CLTV)
- BIP-112 : OP_CHECKSEQUENCEVERIFY - Specification of relative timelocks (CSV)
- Miniscript Reference - Official Miniscript documentation by Pieter Wuille
Official solution websites
- Liana Wallet - Wizardsardine
- Bitcoin Keeper - Bithyve
- Heritage Wallet - Crypto7
Author
This tutorial has been written by Pierre
You can say thanks by tipping the professor.
Credits
This tutorial has not been proofread yet
The original content has been translated by AI, but human review is necessary to ensure its accuracy.
3 303 sats1 652 sats826 satsEvery content on the platform is the result of a collaborative effort: each lesson, translation, and revision is made possible by the work of contributors. For this reason, we are always looking for proofreaders who can review our content in many languages. If you want to participate in the proofreading process, please reach out in our Telegram group and read our tutorial. We remind you that this content is open-source - licensed under CC BY-SA - so it can be freely shared and used, as long as the original source is credited.




