Understand and master the principles of privacy protection when using Bitcoin
Introducing Liana software
- A main spending path, which is always available;
- At least one recovery path, which becomes accessible after a certain time.
- A succession (or inheritance) plan, enabling heirs to recover funds in the event of the user's death. For more information on this subject, we recommend reading part 4 of the BTC102 course.
- A reinforced backup with a recovery time, giving the user the possibility of using his wallet without having to keep the corresponding secret phrase and risk having it stolen, during a burglary for example.
- A safety net for people starting out with Bitcoin: they will manage their own wallet, and their "guardian" (a relative, for example) will reserve the right to recover their funds after a given period.
- A multi-party signature scheme (multisig) with reduced requirements over time, to cope with the disappearance of one or more of the participants, such as a company's partners.
Preparation
- A Ledger Nano S Plus, for everyday expenses;
- A Blockstream Jade, used to recover funds;
- Two storage media (USB sticks) to store the wallet descriptor;
- A letter of succession, containing instructions for recovering the funds;
- A numbered sealed bag, to ensure that the recovery device (the Jade) has not been used.
Installation and configuration
wsh(or_d(pk([3689a8e7/48'/0'/0'/2']xpub6FKYNH4XbbdADV98yTVxgZZrtB4eE2tiUPreEv5iJAS3U1CvXGAtQGFXSHyFYdYNn9wNa9KU1pwfYoxQhwq4sPXGihD725VncdSy66v9WQa/<0;1>/*),and_v(v:pkh([42e629dd/48'/0'/0'/2']xpub6DpQGv9LkwAQXvghWASvsfA7t1BVj7bGDQ939v32iB6aUJsMRB6inckim26gRp74NBdS2zuyfHNXDZ9dTuNXkFFiz6QvwEeVvBuC2cnRWQd/<0;1>/*),older(6))))#8alrve5h
- Blockstream Jade as signature device for the estate;
- A USB cable for connecting and recharging the device;
- A paper backup of the sentence in the event of malfunction or damage to the device (note that the medium can also be metal, and therefore protected from the elements, as is the case with Cryptosteel capsules, for example);
- The USB key containing the wallet descriptor ;
- A paper backup of the descriptor, in case of malfunction or damage to the USB key (this backup has not been photographed here);
- A letter of succession describing the steps to be taken to recover the funds.
Receipt of funds
Current expenditure
Portfolio update
Bitcoin recovery
wsh(or_d(pk([3689a8e7/48'/0'/0'/2']xpub6FKYNH4XbbdADV98yTVxgZZrtB4eE2tiUPreEv5iJAS3U1CvXGAtQGFXSHyFYdYNn9wNa9KU1pwfYoxQhwq4sPXGihD725VncdSy66v9WQa/<0;1>/*),and_v(v:pkh([42e629dd/48'/0'/0'/2']xpub6DpQGv9LkwAQXvghWASvsfA7t1BVj7bGDQ939v32iB6aUJsMRB6inckim26gRp74NBdS2zuyfHNXDZ9dTuNXkFFiz6QvwEeVvBuC2cnRWQd/<0;1>/*),older(6))))#8alrve5h
Bonus: descriptor analysis
wsh(or_d(pk([3689a8e7/48'/0'/0'/2']xpub6FKYNH4XbbdADV98yTVxgZZrtB4eE2tiUPreEv5iJAS3U1CvXGAtQGFXSHyFYdYNn9wNa9KU1pwfYoxQhwq4sPXGihD725VncdSy66v9WQa/<0;1>/*),and_v(v:pkh([42e629dd/48'/0'/0'/2']xpub6DpQGv9LkwAQXvghWASvsfA7t1BVj7bGDQ939v32iB6aUJsMRB6inckim26gRp74NBdS2zuyfHNXDZ9dTuNXkFFiz6QvwEeVvBuC2cnRWQd/<0;1>/*),older(6))))#8alrve5h
wsh(short for witness script hash): This is the type of transactional output created. If we had chosen to use Taproot, the identifier would have beentr.or_d: This is a logical operator indicating that one of the following two conditions must be met for the expense to be accepted (the_dindicates a particular syntax).pk(short for public key): This operator checks a given signature against the following public key, and gives the answer as a Boolean (TRUE or FALSE).[3689a8e7/48'/0'/0'/2']: This element includes the fingerprint of the master key for the main hardware wallet (in this case the Nano S Plus), and the derivation path to the linked extended private key (from which all other private keys are derived).xpub6FKY ... WQa: This is the extended public key linked to the main hardware wallet (here the Nano S Plus)/<0;1>/*: These are the derivation paths for obtaining simple keys and addresses:0for reception,1for internal operations (change), with a "wildcard" (*) allowing sequential derivation of several addresses in a configurable way, similar to the "gap limit" management of classic wallet software.- and_v
: This is a logical operator indicating that *the following two* conditions must be met for the expense to be accepted (the_v` indicates a particular syntax). v:pkh(short for verify: public key hash): This operator verifies a given signature and public key against the public key hash (hash) that follows. This is essentially the same check as for P2PKH and P2WPKH scripts.[42e629dd/48'/0'/0'/2']: This is the same element as above (consisting of the trace and the derivation path), except that the trace of the master key of the hardware recovery wallet (in this case the Jade) is indicated.xpub6DpQ ... WQd: This is the extended public key linked to the hardware recovery wallet (here the Jade).older(6): This operator checks that the transactional output created must have an age strictly greater than 6 blocks in order to be spent.
8alrve5h) is the descriptor checksum, and corresponds to the wallet identifier.<primary_key> CHECKSIG IFDUP NOTIF DUP HASH160 <recovery_key_hash> EQUALVERIFY CHECKSIGVERIFY <locktime> CHECKSEQUENCEVERIFY ENDIF
Author
This tutorial has been written by Ludovic Lars
You can say thanks by tipping the professor.
Ludovic Lars is an author, editor, and trainer in the world of Bitcoin and cryptocurrency. Inspired by liberal ideas, he discovered Bitcoin in 2013 and has been dedicated to it since 2017. He wrote The Elegance of Bitcoin, published in 2024 by Konsensus Network. He contributed to the translation of Cryptoeconomics, The Book of Satoshi, and The Blocksize War. He has also written more than a hundred articles on his blog and other specialized sites. With a scientific background, he has always sought to describe cryptocurrency as accurately as possible and has recently specialized in studying the history of Bitcoin.
Credits
This tutorial has not been proofread yet
The original content has been translated by AI, but human review is necessary to ensure its accuracy.
5 463 sats2 732 sats1 366 satsEvery content on the platform is the result of a collaborative effort: each lesson, translation, and revision is made possible by the work of contributors. For this reason, we are always looking for proofreaders who can review our content in many languages. If you want to participate in the proofreading process, please reach out in our Telegram group and read our tutorial. We remind you that this content is open-source - licensed under CC BY-SA - so it can be freely shared and used, as long as the original source is credited.




