Advanced Setup Guides
Take your Bitcoin security to the highest level.
These guides are for users who already have:
- A working hardware wallet setup
- Verified backup recovery process
- Understanding of basic Bitcoin concepts
If you're new, start with Getting Started and Wallet Setup first.
Why Go Advanced?β
Standard hardware wallet setups are excellent for most users. Advanced setups address specific threat models:
| Setup | Protects Against | Complexity | Who Needs It |
|---|---|---|---|
| Multisig | Single point of failure, device compromise | High | Large holdings, inheritance planning |
| Inheritance Planning | Loss of Bitcoin at death | Medium | Anyone with Bitcoin to pass on |
| Air-Gapped Computer | Network-based attacks, malware | Medium | DIY seed generation, offline signing |
| Bitcoin Computer | Compromised daily-use devices | Medium | Privacy-focused users |
| Open Firmware | BIOS-level backdoors, Intel ME | Very High | Maximum security requirements |
Most people don't need these. Match your security to your threat model.
π Multisig Walletsβ
Multisig Setup Guideβ
Time: 4-8 hours | Difficulty: Advanced | Cost: $230-510
Eliminate single points of failure by requiring multiple keys to spend. In a 2-of-3 multisig, you need any 2 of 3 keys to move funds.
Benefits:
- No single device compromise can steal funds
- Geographic distribution of keys
- Inheritance planning built-in
- Survives loss of one key
What you'll learn:
- Multisig concepts and quorum selection
- Hardware wallet configuration
- Sparrow Wallet multisig setup
- Backup and recovery procedures
Prerequisites: Experience with single-sig hardware wallets, understanding of private keys.
π Inheritance Planningβ
Bitcoin Inheritance Guideβ
Time: 2-4 hours | Difficulty: Intermediate | Cost: Varies
Ensure your Bitcoin passes to your loved onesβnot lost forever. An estimated 4 million Bitcoin are permanently lost, many because owners died without sharing access.
What you'll learn:
- Why Bitcoin inheritance is different from traditional assets
- Simple to advanced inheritance approaches
- Step-by-step multisig inheritance setup
- Common mistakes that lose family fortunes
- Legal considerations and documentation
Best approach: Family multisig where heirs hold keys from the startβno reconstruction needed after death.
π Air-Gapped Computerβ
Air-Gapped Computer Guideβ
Time: 2-4 hours | Difficulty: Intermediate | Cost: $50-200 (or free with old hardware)
A computer that has never and will never connect to any network. Used for:
- DIY seed generation
- Offline transaction signing
- Secure key operations
What you'll learn:
- Types of air-gapped setups
- Hardware selection and preparation
- Software installation (Tails, etc.)
- Secure data transfer methods
Why it matters: Even the best hardware wallet connects to your computer. An air-gapped machine provides complete isolation.
π» Dedicated Bitcoin Computerβ
Bitcoin Computer Guideβ
Time: 2-4 hours | Difficulty: Intermediate | Cost: $50-150 (or free with repurposed hardware)
A computer used exclusively for Bitcoin operationsβseparate from your daily-use devices.
Benefits:
- Reduced attack surface
- No browsing, email, or other risky activities
- Clean environment for wallet software
- Can be hardened specifically for Bitcoin
What you'll learn:
- Hardware selection and options
- Operating system choices
- Security hardening
- Software installation
Difference from air-gapped: A Bitcoin computer can connect to the network (for running a node, broadcasting transactions). An air-gapped computer never connects.
π§ Open-Source Firmwareβ
For users with the highest security requirements, replacing proprietary BIOS/UEFI with open-source firmware eliminates potential backdoors at the deepest level.
Libreboot Guideβ
Difficulty: Very Advanced | Cost: $15-30 (flashing hardware)
Fully open-source firmware that completely replaces proprietary BIOS and removes Intel Management Engine. Maximum transparency and security.
Best for: Users who want complete control and can verify the entire software stack.
Coreboot Guideβ
Difficulty: Very Advanced | Cost: $0-30
Open-source firmware foundation. More hardware support than Libreboot but may retain some proprietary blobs.
Best for: Users who need open firmware on hardware not supported by Libreboot.
Setup Progressionβ
Build advanced capabilities in stages:
Stage 1: Foundation (Do First)β
- Hardware wallet β Basic self-custody
- Backup verification β Confirm recovery works
- Run your own node β Verify transactions yourself
Stage 2: Enhanced Securityβ
- Dedicated Bitcoin computer β Separate from daily use
- Security hardening β OpSec and physical security
- Inheritance planning β Don't let Bitcoin die with you
Stage 3: Advanced Protectionβ
- Air-gapped computer β For offline operations
- DIY seed generation β Verify your entropy
Stage 4: Maximum Securityβ
- Multisig setup β Eliminate single points of failure
- Open firmware β Remove BIOS-level threats
Choosing Your Pathβ
"I want to eliminate single points of failure"β
β Multisig is your answer. Start with 2-of-3.
"I want my family to inherit my Bitcoin"β
β Inheritance Planning β don't let your Bitcoin die with you.
"I want to generate my own seed securely"β
β Air-gapped computer + DIY seed guide
"I want a clean environment for Bitcoin"β
β Dedicated Bitcoin computer
"I want maximum possible security"β
β All of the above, plus open firmware
Common Questionsβ
"Is multisig worth the complexity?"
For significant holdings (life-changing amounts), yes. The complexity cost is worth eliminating single points of failure. For smaller amounts, a well-secured single-sig setup is sufficient.
"Can I use an old laptop as an air-gapped computer?"
Yes! Old laptops are ideal. Disable WiFi/Bluetooth at the hardware level if possible (remove the card). See the air-gapped setup guide.
"Do I really need open-source firmware?"
For most users, no. Standard hardware wallets with good practices provide excellent security. Open firmware is for users with extreme threat models or those who want complete transparency.
"What about hardware wallets with secure elements vs. open source?"
Both approaches have merit. Secure elements provide tamper resistance. Open source provides auditability. Some devices (like Coldcard) offer both. See hardware wallet comparison.
Related Resourcesβ
Prerequisitesβ
- Threat Model Assessment β What level do you need?
- Hardware Wallet Setup β Start here if you haven't
Supporting Guidesβ
- Bitcoin Node Setup β Verify your own transactions
- Security Hardening β OpSec and physical security
- Privacy Guides β Protect your transaction history