
Brand | Block |
---|---|
Headquarters | |
Website | https://bitkey.build/ |
Blog | https://bitkey.build/ |
X (Twitter) | @Bitkeyofficial |
YouTube | @Bitkey_Official |
GitHub | proto-at-block |
Subscription Payment Methods
Which methods of payments you can use to pay the Inheritance Service
Accepts Bitcoin payments via on-chain transactions for subscription fees.
NO
Accepts Bitcoin payments via the Lightning Network for subscription fees.
NO
Accepts alternative cryptocurrency payments for subscription fees.
NO
Accepts traditional credit and debit card payments for subscription fees.
YES
Private Keys
The user retains full control and ownership of their funds.
YES
When you depend on a third-party to store a part of your private keys, you're essentially trusting them with a crucial aspect of your security. This dependency means that if the third-party were to disappear (e.g., go out of business) or lose their own key, you could face serious consequences is the other keys are not properly stored.
You're also vulnerable to a hostage situation. This means that the third-party could potentially exploit their control over your keys, demanding ransom or imposing other unfavorable conditions for releasing them.
Finally, if beneficiaries collude with the third-party, they may attempt to gain unauthorized access to your funds.
NO
Single-Sig
NO
Bitcoin multi-sig allows having up to 15 possible signers to approve any transaction. When using multi-sig, you will have at least one seed phrase per signer, so you can store them in multiple locations.
Required
Requires the use of a specific hardware wallet for the inheritance setup.
Bitkey
If a key becomes compromised or your seed phrases are misplaced, it's best practice to replace this key in your multisig quorum.
?
If the beneficiaries lose their keys, your inheritance could be inaccesible. Some services offer a protection against this risk
NO
Health Checks are a simple way to ensure that your keys are ready to sign transactions securely.
?
Sends reminders to perform regular health checks on your keys and setup.
?
Passing Down Alternatives
Give the Beneficiaries direct control to claim the inheritance for themselves
YES
Give a trusted guardian the control so it can help the Beneficiary claim the inheritance on their behalf
YES
Split the control between the Beneficiary and the Trustee. This will help ensure that each one only has partial control over your bitcoins. The Beneficiary and Trustee will need to work together in order to claim the inheritance.
NO
Supports designating multiple beneficiaries for your Bitcoin inheritance.
NO
Allows assigning specific percentages of the inheritance to different beneficiaries.
NO
Privacy
Not proof of identity required.
YES
In your wallet, the Bitcoin balance you see is the sum of smaller units called Unspent Transaction Outputs (UTXOs). Each UTXO has a history that may or may not belong to you. If your wallet automatically chooses which UTXOs to use in a transaction, you could be revealing unwanted information to the recipient or anyone monitoring the blockchain.
On the other hand, if your wallet allows you to view and select UTXOs for transactions, you may not know the source of each one. This makes it difficult to decide which ones are suitable for different transactional situations. By using a wallet that enables UTXO labeling and Coin Control, you can minimize the amount of information shared during transactions.
For example, suppose your wallet contains both KYC and no-KYC Bitcoin. It's best not to combine these sources in a single transaction because it will link the no-KYC Bitcoin to the KYC Bitcoin associated with your true identity. If you label your coins as 'KYC' or 'no-KYC', you can make an informed decision when spending your sats in the future.
NO
For bitcoin to function reliably and securely, it relies on the voluntary participation of thousands of individuals worldwide. Nodes, which make up the bitcoin network and verify transactions and blocks, are crucial to this process. There are many reasons to consider running your own bitcoin node, including personal benefits and the benefits to the security and resilience of the bitcoin ecosystem.
YES
Official Documentation
Tor (The Onion Router) aims to make all users look the same, making it difficult for you to be fingerprinted based on your browser and device information. With Tor, your traffic is relayed and encrypted three times as it passes over the Tor network. The network is comprised of thousands of volunteer-run servers known as Tor relays. Connecting to your custom Bitcoin node using Tor can provide a number of benefits for privacy and security.
Tor is an anonymity network that helps to conceal your IP address and online activity from potential eavesdroppers, such as your Internet Service Provider (ISP) or other network intermediaries. By using Tor, you can ensure that your Bitcoin node's IP address is not publicly visible and that your node's traffic is encrypted and routed through multiple servers, making it more difficult for someone to trace it back to you.
Connecting to your node using Tor can help to reduce your reliance on centralized services or intermediaries, such as Bitcoin wallet providers or exchanges. By running your own node and connecting to it using Tor, you can have more control over your Bitcoin transactions and data, and reduce your exposure to potential hacks or data breaches at centralized services.
NO
Features
Bitcoin-only services only supports Bitcoin. Less code usually means less attack surface which further improves your security when only storing Bitcoin.
If you are a Bitcoiner, you probably will prefer a BTC-only service.
YES
Designed specifically for cryptocurrency inheritance, not traditional assets.
YES
Exchanges Integration
NO
Allows leaving a personal message for beneficiaries along with the inheritance.
NO
On the activation date, the beneficiary can be notified
NO
Uses Bitcoin's native timelock features to enforce inheritance conditions on-chain.
NO
Method used to refresh or extend the timelock period to prevent premature inheritance activation.
No Need
Allows updating or refreshing the timelock without incurring transaction fees.
YES
Time period beneficiaries must wait before they can claim the inheritance.
6 months
Android Support
Supported
YES
Direct APK Download
YES
A wallet with source-available is released through a source code distribution model where the source can be viewed, and in some cases modified, but without necessarily meeting the criteria to be called open-source. Any wallet is source-available as long its source code is distributed along with it, even if the user has no legal rights to use, share, modify, or even compile it.
YES
Official Documentation
A wallet being open source means that the source code is publicly available and can be freely viewed, used, modified, and distributed by anyone. Users have the legal rights to access, study, modify, and distribute the firmware according to the terms of the open-source license it is released under. This transparency and freedom allow the community to review and contribute to the development of the firmware, ensuring its security, reliability, and trustworthiness.
YES
Whilst anyone may inspect the source code of free and open source software for malicious flaws, most software is distributed pre-compiled with no method to confirm whether they correspond.
A build is reproducible if given the same source code, build environment and build instructions, any party can recreate bit-by-bit identical copies of all specified artifacts.
YES
Official Documentation
iOS Support
Release Notes
?
A wallet with source-available is released through a source code distribution model where the source can be viewed, and in some cases modified, but without necessarily meeting the criteria to be called open-source. Any wallet is source-available as long its source code is distributed along with it, even if the user has no legal rights to use, share, modify, or even compile it.
YES
Official Documentation
A wallet being open source means that the source code is publicly available and can be freely viewed, used, modified, and distributed by anyone. Users have the legal rights to access, study, modify, and distribute the firmware according to the terms of the open-source license it is released under. This transparency and freedom allow the community to review and contribute to the development of the firmware, ensuring its security, reliability, and trustworthiness.
YES
Whilst anyone may inspect the source code of free and open source software for malicious flaws, most software is distributed pre-compiled with no method to confirm whether they correspond.
A build is reproducible if given the same source code, build environment and build instructions, any party can recreate bit-by-bit identical copies of all specified artifacts.
NO
Web Support
Supported
NO
MacOS Support
Supported
NO
Release Notes
-
A wallet with source-available is released through a source code distribution model where the source can be viewed, and in some cases modified, but without necessarily meeting the criteria to be called open-source. Any wallet is source-available as long its source code is distributed along with it, even if the user has no legal rights to use, share, modify, or even compile it.
-
A wallet being open source means that the source code is publicly available and can be freely viewed, used, modified, and distributed by anyone. Users have the legal rights to access, study, modify, and distribute the firmware according to the terms of the open-source license it is released under. This transparency and freedom allow the community to review and contribute to the development of the firmware, ensuring its security, reliability, and trustworthiness.
-
Open source licenses grant permission for anybody to use, modify, and share licensed software for any purpose, subject to conditions preserving the provenance and openness of the software.
-
Whilst anyone may inspect the source code of free and open source software for malicious flaws, most software is distributed pre-compiled with no method to confirm whether they correspond.
A build is reproducible if given the same source code, build environment and build instructions, any party can recreate bit-by-bit identical copies of all specified artifacts.
-
Linux Support
Supported
NO
Release Notes
-
A wallet with source-available is released through a source code distribution model where the source can be viewed, and in some cases modified, but without necessarily meeting the criteria to be called open-source. Any wallet is source-available as long its source code is distributed along with it, even if the user has no legal rights to use, share, modify, or even compile it.
-
A wallet being open source means that the source code is publicly available and can be freely viewed, used, modified, and distributed by anyone. Users have the legal rights to access, study, modify, and distribute the firmware according to the terms of the open-source license it is released under. This transparency and freedom allow the community to review and contribute to the development of the firmware, ensuring its security, reliability, and trustworthiness.
-
Open source licenses grant permission for anybody to use, modify, and share licensed software for any purpose, subject to conditions preserving the provenance and openness of the software.
-
Whilst anyone may inspect the source code of free and open source software for malicious flaws, most software is distributed pre-compiled with no method to confirm whether they correspond.
A build is reproducible if given the same source code, build environment and build instructions, any party can recreate bit-by-bit identical copies of all specified artifacts.
-
Windows Support
Supported
NO
Release Notes
-
A wallet with source-available is released through a source code distribution model where the source can be viewed, and in some cases modified, but without necessarily meeting the criteria to be called open-source. Any wallet is source-available as long its source code is distributed along with it, even if the user has no legal rights to use, share, modify, or even compile it.
-
A wallet being open source means that the source code is publicly available and can be freely viewed, used, modified, and distributed by anyone. Users have the legal rights to access, study, modify, and distribute the firmware according to the terms of the open-source license it is released under. This transparency and freedom allow the community to review and contribute to the development of the firmware, ensuring its security, reliability, and trustworthiness.
-
Open source licenses grant permission for anybody to use, modify, and share licensed software for any purpose, subject to conditions preserving the provenance and openness of the software.
-
Whilst anyone may inspect the source code of free and open source software for malicious flaws, most software is distributed pre-compiled with no method to confirm whether they correspond.
A build is reproducible if given the same source code, build environment and build instructions, any party can recreate bit-by-bit identical copies of all specified artifacts.
-