Nunchuk

Nunchuk

Nunchuk

$480.00
Open selection

Summary

Private Keys: Non-custodial, Multi-sig (PSBTs), Key Replacement Assisted Support, Health Checks, Health Checks Reminders

Passing Down Alternatives: Direct Inheritance, Indirect Inheritance, Joint Control, Multiple Beneficiaries (1 per Multisig)

Privacy: Non-KYC, Coin Control, Custom Node, Tor

Features: Bitcoin-only, Crypto Specific Solution, Message for Beneficiary, Notifications to Beneficiary, Timelock Refresh Method (On App), Zero Cost to Update Timelock

Hardware Wallets Support: Bitbox02, Coldcard Mk4, Coldcard Q, Jade, Keystone 3 Pro, Ledger Nano S Plus, Ledger Nano X, Passport Core, Portal, SeedSigner, Specter DIY, Tapsigner, Trezor Model One, Trezor Safe 3, Trezor Safe 5, Trezor Model t

Company

BrandNunchuk
Headquarters
USA flagUSA
Websitehttps://nunchuk.io/
Bloghttps://nunchuk.io/blog
X (Twitter)@nunchuk_io
Nostrnunchuk_io
GitHubnunchuk-io
nullNunchuk.io

Subscription Payment Methods

Which methods of payments you can use to pay the Inheritance Service

Accepts Bitcoin payments via on-chain transactions for subscription fees.

YES

Accepts Bitcoin payments via the Lightning Network for subscription fees.

NO

Accepts alternative cryptocurrency payments for subscription fees.

NO

Accepts traditional credit and debit card payments for subscription fees.

YES

Private Keys

The user retains full control and ownership of their funds.

YES

When you depend on a third-party to store a part of your private keys, you're essentially trusting them with a crucial aspect of your security. This dependency means that if the third-party were to disappear (e.g., go out of business) or lose their own key, you could face serious consequences is the other keys are not properly stored.

You're also vulnerable to a hostage situation. This means that the third-party could potentially exploit their control over your keys, demanding ransom or imposing other unfavorable conditions for releasing them.

Finally, if beneficiaries collude with the third-party, they may attempt to gain unauthorized access to your funds.

NO

Official Documentation

The Owner can decide to keep the beneficiaries in the dark about the existence of the inheritance and don't distribute the beneficiary keys immediately. So, beneficiaries can't collude with the provider to gain unauthorized access to your funds.

Instead, if the the beneficiary keys are distributed from zero day, collusion between the provider and the beneficiary could happen.

Single-Sig

NO

Bitcoin multi-sig allows having up to 15 possible signers to approve any transaction. When using multi-sig, you will have at least one seed phrase per signer, so you can store them in multiple locations.

Required (2-of-4)

Official Documentation

The service only safekeeps one of the keys in your multisig wallet, which requires multiple keys to withdraw funds. The service never has custody of your bitcoins.

Requires the use of a specific hardware wallet for the inheritance setup.

Tapsigner/Coldcard + 2 hardware keys

If a key becomes compromised or your seed phrases are misplaced, it's best practice to replace this key in your multisig quorum.

YES

If the beneficiaries lose their keys, your inheritance could be inaccesible. Some services offer a protection against this risk

NO

Health Checks are a simple way to ensure that your keys are ready to sign transactions securely.

YES

Sends reminders to perform regular health checks on your keys and setup.

YES

Passing Down Alternatives

Give the Beneficiaries direct control to claim the inheritance for themselves

YES

Official Documentation

The simplest way to use the plan is to give the Beneficiary direct control over the two secrets. Upon the Activation Date, they can claim the inheritance for themselves.

Give a trusted guardian the control so it can help the Beneficiary claim the inheritance on their behalf

YES

Official Documentation

You can choose to leave both secrets with a trusted guardian. This can be the Trustee of your estate plan. Upon the Activation Date, the Trustee can help the Beneficiary claim the inheritance on their behalf.

Split the control between the Beneficiary and the Trustee. This will help ensure that each one only has partial control over your bitcoins. The Beneficiary and Trustee will need to work together in order to claim the inheritance.

YES

Official Documentation

Split the two secrets between the Beneficiary and the Trustee. This will help ensure that each one only has partial control over your bitcoins. Upon the Activation Date, the Beneficiary and Trustee will need to bring together the two secrets in order to claim the inheritance.

Supports designating multiple beneficiaries for your Bitcoin inheritance.

1 per Multisig

Allows assigning specific percentages of the inheritance to different beneficiaries.

Manually

Official Documentation

There is no automatic support to assign percentages to the beneficiares. You need to manually assign the percentage of your funds to each multisig wallet assigned to each beneficiary

Privacy

Not proof of identity required.

YES

Official Documentation

Nunchuk inheritance plan is built on cryptographic secrets, not proof of identity. That means both you and your Beneficiary can keep your privacy.

Each inheritance plan is uniquely identified by a Magic Phrase. The phrase will allow the Beneficiary or Trustee to locate the inheritance's backup data stored on Nunchuk server.

The inheritance's backup data is protected by a password. You will need this password in order to recover the inheritance key during the claiming process.

In your wallet, the Bitcoin balance you see is the sum of smaller units called Unspent Transaction Outputs (UTXOs). Each UTXO has a history that may or may not belong to you. If your wallet automatically chooses which UTXOs to use in a transaction, you could be revealing unwanted information to the recipient or anyone monitoring the blockchain.

On the other hand, if your wallet allows you to view and select UTXOs for transactions, you may not know the source of each one. This makes it difficult to decide which ones are suitable for different transactional situations. By using a wallet that enables UTXO labeling and Coin Control, you can minimize the amount of information shared during transactions.

For example, suppose your wallet contains both KYC and no-KYC Bitcoin. It's best not to combine these sources in a single transaction because it will link the no-KYC Bitcoin to the KYC Bitcoin associated with your true identity. If you label your coins as 'KYC' or 'no-KYC', you can make an informed decision when spending your sats in the future.

YES

For bitcoin to function reliably and securely, it relies on the voluntary participation of thousands of individuals worldwide. Nodes, which make up the bitcoin network and verify transactions and blocks, are crucial to this process. There are many reasons to consider running your own bitcoin node, including personal benefits and the benefits to the security and resilience of the bitcoin ecosystem.

YES

Tor (The Onion Router) aims to make all users look the same, making it difficult for you to be fingerprinted based on your browser and device information. With Tor, your traffic is relayed and encrypted three times as it passes over the Tor network. The network is comprised of thousands of volunteer-run servers known as Tor relays. Connecting to your custom Bitcoin node using Tor can provide a number of benefits for privacy and security.

Tor is an anonymity network that helps to conceal your IP address and online activity from potential eavesdroppers, such as your Internet Service Provider (ISP) or other network intermediaries. By using Tor, you can ensure that your Bitcoin node's IP address is not publicly visible and that your node's traffic is encrypted and routed through multiple servers, making it more difficult for someone to trace it back to you.

Connecting to your node using Tor can help to reduce your reliance on centralized services or intermediaries, such as Bitcoin wallet providers or exchanges. By running your own node and connecting to it using Tor, you can have more control over your Bitcoin transactions and data, and reduce your exposure to potential hacks or data breaches at centralized services.

YES

Features

Bitcoin-only services only supports Bitcoin. Less code usually means less attack surface which further improves your security when only storing Bitcoin.

If you are a Bitcoiner, you probably will prefer a BTC-only service.

YES

Designed specifically for cryptocurrency inheritance, not traditional assets.

YES

Exchanges Integration

NO

Allows leaving a personal message for beneficiaries along with the inheritance.

YES

On the activation date, the beneficiary can be notified

YES (by email)

Uses Bitcoin's native timelock features to enforce inheritance conditions on-chain.

NO

Method used to refresh or extend the timelock period to prevent premature inheritance activation.

On App

Allows updating or refreshing the timelock without incurring transaction fees.

YES

Time period beneficiaries must wait before they can claim the inheritance.

Defined by the owner

Official Documentation

The Owner sets a timelock on the inheritance.

Before the timelock expires, claiming is disallowed.

As long as the Owner is alive, they can keep refreshing the timelock indefinitely.

After the timelock has expired, the Beneficiary can create an account and start a claim. Claiming requires the Beneficiary to know two cryptographic secrets: the Magic Phrase, and the Backup Password.

Once a claim is initiated, an optional Buffer Period ensues (7 days or 30 days).

During the Buffer Period, Nunchuk will notify the Owner of the claiming attempt several times.

Android Support

Supported

YES

Google Play

YES

Official Documentation

Direct APK Download

YES

Official Documentation

Release Notes

YES

Official Documentation

A wallet with source-available is released through a source code distribution model where the source can be viewed, and in some cases modified, but without necessarily meeting the criteria to be called open-source. Any wallet is source-available as long its source code is distributed along with it, even if the user has no legal rights to use, share, modify, or even compile it.

YES

Official Documentation

A wallet being open source means that the source code is publicly available and can be freely viewed, used, modified, and distributed by anyone. Users have the legal rights to access, study, modify, and distribute the firmware according to the terms of the open-source license it is released under. This transparency and freedom allow the community to review and contribute to the development of the firmware, ensuring its security, reliability, and trustworthiness.

YES

Open source licenses grant permission for anybody to use, modify, and share licensed software for any purpose, subject to conditions preserving the provenance and openness of the software.

GPLv3

Official Documentation

Whilst anyone may inspect the source code of free and open source software for malicious flaws, most software is distributed pre-compiled with no method to confirm whether they correspond.

A build is reproducible if given the same source code, build environment and build instructions, any party can recreate bit-by-bit identical copies of all specified artifacts.

YES

iOS Support

Supported

YES

Official Documentation

Release Notes

?

A wallet with source-available is released through a source code distribution model where the source can be viewed, and in some cases modified, but without necessarily meeting the criteria to be called open-source. Any wallet is source-available as long its source code is distributed along with it, even if the user has no legal rights to use, share, modify, or even compile it.

NO

A wallet being open source means that the source code is publicly available and can be freely viewed, used, modified, and distributed by anyone. Users have the legal rights to access, study, modify, and distribute the firmware according to the terms of the open-source license it is released under. This transparency and freedom allow the community to review and contribute to the development of the firmware, ensuring its security, reliability, and trustworthiness.

NO

Open source licenses grant permission for anybody to use, modify, and share licensed software for any purpose, subject to conditions preserving the provenance and openness of the software.

-

Whilst anyone may inspect the source code of free and open source software for malicious flaws, most software is distributed pre-compiled with no method to confirm whether they correspond.

A build is reproducible if given the same source code, build environment and build instructions, any party can recreate bit-by-bit identical copies of all specified artifacts.

NO

Web Support

Supported

NO

MacOS Support

Supported

YES

Release Notes

YES

Official Documentation

A wallet with source-available is released through a source code distribution model where the source can be viewed, and in some cases modified, but without necessarily meeting the criteria to be called open-source. Any wallet is source-available as long its source code is distributed along with it, even if the user has no legal rights to use, share, modify, or even compile it.

YES

Official Documentation

A wallet being open source means that the source code is publicly available and can be freely viewed, used, modified, and distributed by anyone. Users have the legal rights to access, study, modify, and distribute the firmware according to the terms of the open-source license it is released under. This transparency and freedom allow the community to review and contribute to the development of the firmware, ensuring its security, reliability, and trustworthiness.

YES

Open source licenses grant permission for anybody to use, modify, and share licensed software for any purpose, subject to conditions preserving the provenance and openness of the software.

GPLv3

Official Documentation

Whilst anyone may inspect the source code of free and open source software for malicious flaws, most software is distributed pre-compiled with no method to confirm whether they correspond.

A build is reproducible if given the same source code, build environment and build instructions, any party can recreate bit-by-bit identical copies of all specified artifacts.

NO

Linux Support

Supported

YES

Release Notes

YES

Official Documentation

A wallet with source-available is released through a source code distribution model where the source can be viewed, and in some cases modified, but without necessarily meeting the criteria to be called open-source. Any wallet is source-available as long its source code is distributed along with it, even if the user has no legal rights to use, share, modify, or even compile it.

YES

Official Documentation

A wallet being open source means that the source code is publicly available and can be freely viewed, used, modified, and distributed by anyone. Users have the legal rights to access, study, modify, and distribute the firmware according to the terms of the open-source license it is released under. This transparency and freedom allow the community to review and contribute to the development of the firmware, ensuring its security, reliability, and trustworthiness.

YES

Open source licenses grant permission for anybody to use, modify, and share licensed software for any purpose, subject to conditions preserving the provenance and openness of the software.

GPLv3

Official Documentation

Whilst anyone may inspect the source code of free and open source software for malicious flaws, most software is distributed pre-compiled with no method to confirm whether they correspond.

A build is reproducible if given the same source code, build environment and build instructions, any party can recreate bit-by-bit identical copies of all specified artifacts.

NO

Windows Support

Supported

YES

Release Notes

YES

Official Documentation

A wallet with source-available is released through a source code distribution model where the source can be viewed, and in some cases modified, but without necessarily meeting the criteria to be called open-source. Any wallet is source-available as long its source code is distributed along with it, even if the user has no legal rights to use, share, modify, or even compile it.

YES

Official Documentation

A wallet being open source means that the source code is publicly available and can be freely viewed, used, modified, and distributed by anyone. Users have the legal rights to access, study, modify, and distribute the firmware according to the terms of the open-source license it is released under. This transparency and freedom allow the community to review and contribute to the development of the firmware, ensuring its security, reliability, and trustworthiness.

YES

Open source licenses grant permission for anybody to use, modify, and share licensed software for any purpose, subject to conditions preserving the provenance and openness of the software.

GPLv3

Official Documentation

Whilst anyone may inspect the source code of free and open source software for malicious flaws, most software is distributed pre-compiled with no method to confirm whether they correspond.

A build is reproducible if given the same source code, build environment and build instructions, any party can recreate bit-by-bit identical copies of all specified artifacts.

NO

Inheritance

Comparing Bitcoin Inheritance Services feature by feature

More Nunchuk products
Smart Home Compared