
Summary
Private Keys: Non-custodial, Multi-sig (PSBTs), Key Replacement Assisted Support, Health Checks, Health Checks Reminders
Passing Down Alternatives: Direct Inheritance, Indirect Inheritance, Joint Control, Multiple Beneficiaries (1 per Multisig)
Privacy: Non-KYC, Coin Control, Custom Node, Tor
Features: Bitcoin-only, Crypto Specific Solution, Message for Beneficiary, Notifications to Beneficiary, Timelock Refresh Method (On App), Zero Cost to Update Timelock
Hardware Wallets Support: Bitbox02, Coldcard Mk4, Coldcard Q, Jade, Keystone 3 Pro, Ledger Nano S Plus, Ledger Nano X, Passport Core, Portal, SeedSigner, Specter DIY, Tapsigner, Trezor Model One, Trezor Safe 3, Trezor Safe 5, Trezor Model t
Brand | Nunchuk |
---|---|
Headquarters | |
Website | https://nunchuk.io/ |
Blog | https://nunchuk.io/blog |
X (Twitter) | @nunchuk_io |
Nostr | nunchuk_io |
GitHub | nunchuk-io |
null | Nunchuk.io |
Subscription Payment Methods
Which methods of payments you can use to pay the Inheritance Service
Accepts Bitcoin payments via on-chain transactions for subscription fees.
YES
Accepts Bitcoin payments via the Lightning Network for subscription fees.
NO
Accepts alternative cryptocurrency payments for subscription fees.
NO
Accepts traditional credit and debit card payments for subscription fees.
YES
Private Keys
The user retains full control and ownership of their funds.
YES
When you depend on a third-party to store a part of your private keys, you're essentially trusting them with a crucial aspect of your security. This dependency means that if the third-party were to disappear (e.g., go out of business) or lose their own key, you could face serious consequences is the other keys are not properly stored.
You're also vulnerable to a hostage situation. This means that the third-party could potentially exploit their control over your keys, demanding ransom or imposing other unfavorable conditions for releasing them.
Finally, if beneficiaries collude with the third-party, they may attempt to gain unauthorized access to your funds.
NO
Official Documentation
The Owner can decide to keep the beneficiaries in the dark about the existence of the inheritance and don't distribute the beneficiary keys immediately. So, beneficiaries can't collude with the provider to gain unauthorized access to your funds.
Instead, if the the beneficiary keys are distributed from zero day, collusion between the provider and the beneficiary could happen.
Single-Sig
NO
Bitcoin multi-sig allows having up to 15 possible signers to approve any transaction. When using multi-sig, you will have at least one seed phrase per signer, so you can store them in multiple locations.
Required (2-of-4)
Official Documentation
The service only safekeeps one of the keys in your multisig wallet, which requires multiple keys to withdraw funds. The service never has custody of your bitcoins.
Requires the use of a specific hardware wallet for the inheritance setup.
Tapsigner/Coldcard + 2 hardware keys
If a key becomes compromised or your seed phrases are misplaced, it's best practice to replace this key in your multisig quorum.
YES
Official Documentation
If the beneficiaries lose their keys, your inheritance could be inaccesible. Some services offer a protection against this risk
NO
Health Checks are a simple way to ensure that your keys are ready to sign transactions securely.
YES
Sends reminders to perform regular health checks on your keys and setup.
YES
Passing Down Alternatives
Give the Beneficiaries direct control to claim the inheritance for themselves
YES
Official Documentation
The simplest way to use the plan is to give the Beneficiary direct control over the two secrets. Upon the Activation Date, they can claim the inheritance for themselves.
Give a trusted guardian the control so it can help the Beneficiary claim the inheritance on their behalf
YES
Official Documentation
You can choose to leave both secrets with a trusted guardian. This can be the Trustee of your estate plan. Upon the Activation Date, the Trustee can help the Beneficiary claim the inheritance on their behalf.
Split the control between the Beneficiary and the Trustee. This will help ensure that each one only has partial control over your bitcoins. The Beneficiary and Trustee will need to work together in order to claim the inheritance.
YES
Official Documentation
Split the two secrets between the Beneficiary and the Trustee. This will help ensure that each one only has partial control over your bitcoins. Upon the Activation Date, the Beneficiary and Trustee will need to bring together the two secrets in order to claim the inheritance.
Supports designating multiple beneficiaries for your Bitcoin inheritance.
1 per Multisig
Allows assigning specific percentages of the inheritance to different beneficiaries.
Manually
Official Documentation
There is no automatic support to assign percentages to the beneficiares. You need to manually assign the percentage of your funds to each multisig wallet assigned to each beneficiary
Privacy
Not proof of identity required.
YES
Official Documentation
Nunchuk inheritance plan is built on cryptographic secrets, not proof of identity. That means both you and your Beneficiary can keep your privacy.
Each inheritance plan is uniquely identified by a Magic Phrase. The phrase will allow the Beneficiary or Trustee to locate the inheritance's backup data stored on Nunchuk server.
The inheritance's backup data is protected by a password. You will need this password in order to recover the inheritance key during the claiming process.
In your wallet, the Bitcoin balance you see is the sum of smaller units called Unspent Transaction Outputs (UTXOs). Each UTXO has a history that may or may not belong to you. If your wallet automatically chooses which UTXOs to use in a transaction, you could be revealing unwanted information to the recipient or anyone monitoring the blockchain.
On the other hand, if your wallet allows you to view and select UTXOs for transactions, you may not know the source of each one. This makes it difficult to decide which ones are suitable for different transactional situations. By using a wallet that enables UTXO labeling and Coin Control, you can minimize the amount of information shared during transactions.
For example, suppose your wallet contains both KYC and no-KYC Bitcoin. It's best not to combine these sources in a single transaction because it will link the no-KYC Bitcoin to the KYC Bitcoin associated with your true identity. If you label your coins as 'KYC' or 'no-KYC', you can make an informed decision when spending your sats in the future.
YES
Official Documentation
For bitcoin to function reliably and securely, it relies on the voluntary participation of thousands of individuals worldwide. Nodes, which make up the bitcoin network and verify transactions and blocks, are crucial to this process. There are many reasons to consider running your own bitcoin node, including personal benefits and the benefits to the security and resilience of the bitcoin ecosystem.
YES
Tor (The Onion Router) aims to make all users look the same, making it difficult for you to be fingerprinted based on your browser and device information. With Tor, your traffic is relayed and encrypted three times as it passes over the Tor network. The network is comprised of thousands of volunteer-run servers known as Tor relays. Connecting to your custom Bitcoin node using Tor can provide a number of benefits for privacy and security.
Tor is an anonymity network that helps to conceal your IP address and online activity from potential eavesdroppers, such as your Internet Service Provider (ISP) or other network intermediaries. By using Tor, you can ensure that your Bitcoin node's IP address is not publicly visible and that your node's traffic is encrypted and routed through multiple servers, making it more difficult for someone to trace it back to you.
Connecting to your node using Tor can help to reduce your reliance on centralized services or intermediaries, such as Bitcoin wallet providers or exchanges. By running your own node and connecting to it using Tor, you can have more control over your Bitcoin transactions and data, and reduce your exposure to potential hacks or data breaches at centralized services.
YES
Features
Bitcoin-only services only supports Bitcoin. Less code usually means less attack surface which further improves your security when only storing Bitcoin.
If you are a Bitcoiner, you probably will prefer a BTC-only service.
YES
Designed specifically for cryptocurrency inheritance, not traditional assets.
YES
Exchanges Integration
NO
Allows leaving a personal message for beneficiaries along with the inheritance.
YES
On the activation date, the beneficiary can be notified
YES (by email)
Uses Bitcoin's native timelock features to enforce inheritance conditions on-chain.
NO
Method used to refresh or extend the timelock period to prevent premature inheritance activation.
On App
Allows updating or refreshing the timelock without incurring transaction fees.
YES
Time period beneficiaries must wait before they can claim the inheritance.
Defined by the owner
Official Documentation
The Owner sets a timelock on the inheritance.
Before the timelock expires, claiming is disallowed.
As long as the Owner is alive, they can keep refreshing the timelock indefinitely.
After the timelock has expired, the Beneficiary can create an account and start a claim. Claiming requires the Beneficiary to know two cryptographic secrets: the Magic Phrase, and the Backup Password.
Once a claim is initiated, an optional Buffer Period ensues (7 days or 30 days).
During the Buffer Period, Nunchuk will notify the Owner of the claiming attempt several times.
Android Support
Supported
YES
A wallet with source-available is released through a source code distribution model where the source can be viewed, and in some cases modified, but without necessarily meeting the criteria to be called open-source. Any wallet is source-available as long its source code is distributed along with it, even if the user has no legal rights to use, share, modify, or even compile it.
YES
Official Documentation
A wallet being open source means that the source code is publicly available and can be freely viewed, used, modified, and distributed by anyone. Users have the legal rights to access, study, modify, and distribute the firmware according to the terms of the open-source license it is released under. This transparency and freedom allow the community to review and contribute to the development of the firmware, ensuring its security, reliability, and trustworthiness.
YES
Whilst anyone may inspect the source code of free and open source software for malicious flaws, most software is distributed pre-compiled with no method to confirm whether they correspond.
A build is reproducible if given the same source code, build environment and build instructions, any party can recreate bit-by-bit identical copies of all specified artifacts.
YES
iOS Support
Release Notes
?
A wallet with source-available is released through a source code distribution model where the source can be viewed, and in some cases modified, but without necessarily meeting the criteria to be called open-source. Any wallet is source-available as long its source code is distributed along with it, even if the user has no legal rights to use, share, modify, or even compile it.
NO
A wallet being open source means that the source code is publicly available and can be freely viewed, used, modified, and distributed by anyone. Users have the legal rights to access, study, modify, and distribute the firmware according to the terms of the open-source license it is released under. This transparency and freedom allow the community to review and contribute to the development of the firmware, ensuring its security, reliability, and trustworthiness.
NO
Open source licenses grant permission for anybody to use, modify, and share licensed software for any purpose, subject to conditions preserving the provenance and openness of the software.
-
Whilst anyone may inspect the source code of free and open source software for malicious flaws, most software is distributed pre-compiled with no method to confirm whether they correspond.
A build is reproducible if given the same source code, build environment and build instructions, any party can recreate bit-by-bit identical copies of all specified artifacts.
NO
Web Support
Supported
NO
MacOS Support
Supported
YES
A wallet with source-available is released through a source code distribution model where the source can be viewed, and in some cases modified, but without necessarily meeting the criteria to be called open-source. Any wallet is source-available as long its source code is distributed along with it, even if the user has no legal rights to use, share, modify, or even compile it.
YES
Official Documentation
A wallet being open source means that the source code is publicly available and can be freely viewed, used, modified, and distributed by anyone. Users have the legal rights to access, study, modify, and distribute the firmware according to the terms of the open-source license it is released under. This transparency and freedom allow the community to review and contribute to the development of the firmware, ensuring its security, reliability, and trustworthiness.
YES
Whilst anyone may inspect the source code of free and open source software for malicious flaws, most software is distributed pre-compiled with no method to confirm whether they correspond.
A build is reproducible if given the same source code, build environment and build instructions, any party can recreate bit-by-bit identical copies of all specified artifacts.
NO
Linux Support
Supported
YES
A wallet with source-available is released through a source code distribution model where the source can be viewed, and in some cases modified, but without necessarily meeting the criteria to be called open-source. Any wallet is source-available as long its source code is distributed along with it, even if the user has no legal rights to use, share, modify, or even compile it.
YES
Official Documentation
A wallet being open source means that the source code is publicly available and can be freely viewed, used, modified, and distributed by anyone. Users have the legal rights to access, study, modify, and distribute the firmware according to the terms of the open-source license it is released under. This transparency and freedom allow the community to review and contribute to the development of the firmware, ensuring its security, reliability, and trustworthiness.
YES
Whilst anyone may inspect the source code of free and open source software for malicious flaws, most software is distributed pre-compiled with no method to confirm whether they correspond.
A build is reproducible if given the same source code, build environment and build instructions, any party can recreate bit-by-bit identical copies of all specified artifacts.
NO
Windows Support
Supported
YES
A wallet with source-available is released through a source code distribution model where the source can be viewed, and in some cases modified, but without necessarily meeting the criteria to be called open-source. Any wallet is source-available as long its source code is distributed along with it, even if the user has no legal rights to use, share, modify, or even compile it.
YES
Official Documentation
A wallet being open source means that the source code is publicly available and can be freely viewed, used, modified, and distributed by anyone. Users have the legal rights to access, study, modify, and distribute the firmware according to the terms of the open-source license it is released under. This transparency and freedom allow the community to review and contribute to the development of the firmware, ensuring its security, reliability, and trustworthiness.
YES
Whilst anyone may inspect the source code of free and open source software for malicious flaws, most software is distributed pre-compiled with no method to confirm whether they correspond.
A build is reproducible if given the same source code, build environment and build instructions, any party can recreate bit-by-bit identical copies of all specified artifacts.
NO