With the family savings wallet in place, establishing a robust backup strategy is crucial. However, there’s no universal solution for wallet backups. Each family must tailor their approach based on their unique circumstances, considering factors such as:
Relationships between family members
Amount of funds stored
Access to secure storage locations
Technical comfort level of family members
Desired balance between security and accessibility
The backup scheme outlined below is one potential approach. It aims to balance security, privacy, and ease of use, but may not suit every family’s needs. As you read through this guide, consider how you might adapt these strategies to best fit your family’s situation.
Firstly, users need to back up the private keys. In our example, the Joneses need to safely backup and store six private keys (three primary keys and three inheritance keys). We describe some best practices on how to back up and store private keys on the bitcoin backups page.
In addition to the private keys, it is also necessary to back up the wallet configuration. This is important because the wallet application needs to know how to generate corresponding bitcoin addresses as well as the rules that define how bitcoin can be spent from these addresses. The wallet configuration is sometimes also called the wallet descriptor. It’s a small piece of text that contains all the information that a wallet application needs to recover a multi-key wallet.
The backup of the wallet configuration does not require the same level of security as a private key backup, because it does not contain any private key material. It is, however, a critical piece of information. If you lose the wallet configuration and have not backed up at least all extended public keys (XPUBs), including their fingerprint and derivation path, you will not be able to recover the wallet in case of need.
The wallet configuration is privacy-sensitive
A third party with access to the configuration can import the wallet and monitor all activity, past and future. However, without the necessary private keys, they cannot spend funds.
Our application goes a bit further than only providing the users with a wallet descriptor. It generates a recovery kit that contains all necessary information in a variety of formats, so that users can easily restore a wallet in case of need. The recovery kit is a ZIP folder that includes:
Wallet backup files compatible with third-party applications like Sparrow, Electrum or Nunchuk
A recovery PDF containing:
Wallet information and descriptor (as a QR code and in text form)
Details about the two key sets and individual signing keys
Visual representation of the wallet’s unlocking rules
If anyone needs to recover the wallet, they can use the recovery PDF to quickly understand the wallet structure and import it into their preferred wallet software.
Alice and Bob want to ensure that they can restore the wallet themselves, if they ever need to. They also want to make sure that they have a robust setup in place for their children to access their inheritance.
To achieve this goal, their backup strategy accounts for the following three scenarios:
Alice and Bob need to recover the wallet themselves: They might simply need to restore the wallet because one (or both) of them lost access to their phone or computer. This route also accounts for one of the most likely scenarios in which one spouse outlives the other
A self-sovereign inheritance route for Christina and David: The children should be able to use their inheritance keys and the backup material without any outside help
An assisted inheritance route that provides a fallback in case the self-sovereign inheritance fails. It is designed to help Christina and David access the funds through regular inheritance proceedings.
As we have covered on the wallet creation page, both of the inheritance routes for Christina and David are available after six months of wallet inactivity.
The diagram below provides a high-level overview of how Alice and Bob distribute the backup material to achieve this goal. It supports the recovery scenarios outlined above, while maintaining financial privacy for Alice and Bob during their lifetimes.
Alice and Bob each store an encrypted version of the recovery kit in their own personal vaults of their password manager. Encrypting the recovery kit protects it from a potential security breach on the side of the password manager.
To make sure that Christina and David will be able to retrieve both the recovery kit and the password to decrypt it, Alice and Bob create a shared family vault in the password manager, where they store the following pieces of information:
To enable the assisted inheritance route for their children, Alice and Bob provide their lawyer, Edward, with an encrypted copy of the recovery kit. They store the password separately in a bank deposit box. This way, Christina and David can access the funds through legal channels if necessary, without compromising privacy.
Edward’s office: Encrypted copy of the recovery kit (without password) in a tamper-evident bag
Bank deposit box: Recovery kit password in a tamper-evident bag
This approach makes a potential trade-off in terms of privacy, because the children could access the backup material and recover the wallet. This is acceptable for Alice and Bob, since they have good relationships and trust their children. After all, this is the reason they have chosen to include them in the setup in the first place.
But even if Christina and David would breach their parents’ trust and import the wallet, they would not be able to move any funds, because their inheritance keys are time locked. And since Alice and Bob access their safe regularly, they would notice that the bag with the backup material has been opened. They can then safely move the funds to a new wallet, for which they would implement more restrictive security measures.
Alice and Bob keep a copy of their Last Will in the home safe. It references the bitcoin wallet and provides a lead to Edward, their lawyer. To ensure a smooth inheritance process, Alice and Bob also provide a sealed copy of the Will to Edward.
The setup oulined above addresses some important aspects of wallet backups:
Tamper-evidence: The tamper-evident bag in the home safe allows Alice and Bob to quickly check if anyone has attempted to access the backup materials
Separation of components: By keeping the encrypted backup kit with Edward and the password in the bank deposit box, the Jones family ensures that no single party can access the funds without proper authorization
Limited information sharing: Edward can’t monitor the wallet transactions because he doesn’t have the password
Redundancy: If the home safe becomes inaccessible, Christina and David can still recover the wallet through Edward and the bank deposit box
Simplicity: The streamlined process makes it easier for the Jones family to maintain and use the backup system when needed
If Alice or Bob need to recover the wallet themselves they can easily do so by using the backup materials from the home safe or their password manager.
If either Bob or Alice need to recover the funds alone, without the help of one another, they have two options. They can either use their own key plus the shared ColdCard, which is stored in a safe location. Alternatively they can wait for the recovery path to kick in after 6 months.
This backup strategy offers the Jones family a balanced approach to securing their multi-key wallet. It provides multiple access routes, maintains privacy, and simplifies the overall process while ensuring critical information remains protected and accessible when needed. It ensures both: immediate access for Alice and Bob and a clear path for inheritance.