Skip to main content

Advanced Setup Guides

Take your Bitcoin security to the highest level.

Prerequisites

These guides are for users who already have:

  • A working hardware wallet setup
  • Verified backup recovery process
  • Understanding of basic Bitcoin concepts

If you're new, start with Getting Started and Wallet Setup first.

Why Go Advanced?​

Standard hardware wallet setups are excellent for most users. Advanced setups address specific threat models:

SetupProtects AgainstComplexityWho Needs It
MultisigSingle point of failure, device compromiseHighLarge holdings, inheritance planning
Inheritance PlanningLoss of Bitcoin at deathMediumAnyone with Bitcoin to pass on
Air-Gapped ComputerNetwork-based attacks, malwareMediumDIY seed generation, offline signing
Bitcoin ComputerCompromised daily-use devicesMediumPrivacy-focused users
Open FirmwareBIOS-level backdoors, Intel MEVery HighMaximum security requirements

Most people don't need these. Match your security to your threat model.


πŸ” Multisig Wallets​

Multisig Setup Guide​

Time: 4-8 hours | Difficulty: Advanced | Cost: $230-510

Eliminate single points of failure by requiring multiple keys to spend. In a 2-of-3 multisig, you need any 2 of 3 keys to move funds.

Benefits:

  • No single device compromise can steal funds
  • Geographic distribution of keys
  • Inheritance planning built-in
  • Survives loss of one key

What you'll learn:

  • Multisig concepts and quorum selection
  • Hardware wallet configuration
  • Sparrow Wallet multisig setup
  • Backup and recovery procedures

Prerequisites: Experience with single-sig hardware wallets, understanding of private keys.


πŸ“œ Inheritance Planning​

Bitcoin Inheritance Guide​

Time: 2-4 hours | Difficulty: Intermediate | Cost: Varies

Ensure your Bitcoin passes to your loved onesβ€”not lost forever. An estimated 4 million Bitcoin are permanently lost, many because owners died without sharing access.

What you'll learn:

  • Why Bitcoin inheritance is different from traditional assets
  • Simple to advanced inheritance approaches
  • Step-by-step multisig inheritance setup
  • Common mistakes that lose family fortunes
  • Legal considerations and documentation

Best approach: Family multisig where heirs hold keys from the startβ€”no reconstruction needed after death.


πŸ”Œ Air-Gapped Computer​

Air-Gapped Computer Guide​

Time: 2-4 hours | Difficulty: Intermediate | Cost: $50-200 (or free with old hardware)

A computer that has never and will never connect to any network. Used for:

  • DIY seed generation
  • Offline transaction signing
  • Secure key operations

What you'll learn:

  • Types of air-gapped setups
  • Hardware selection and preparation
  • Software installation (Tails, etc.)
  • Secure data transfer methods

Why it matters: Even the best hardware wallet connects to your computer. An air-gapped machine provides complete isolation.


πŸ’» Dedicated Bitcoin Computer​

Bitcoin Computer Guide​

Time: 2-4 hours | Difficulty: Intermediate | Cost: $50-150 (or free with repurposed hardware)

A computer used exclusively for Bitcoin operationsβ€”separate from your daily-use devices.

Benefits:

  • Reduced attack surface
  • No browsing, email, or other risky activities
  • Clean environment for wallet software
  • Can be hardened specifically for Bitcoin

What you'll learn:

  • Hardware selection and options
  • Operating system choices
  • Security hardening
  • Software installation

Difference from air-gapped: A Bitcoin computer can connect to the network (for running a node, broadcasting transactions). An air-gapped computer never connects.


πŸ”§ Open-Source Firmware​

For users with the highest security requirements, replacing proprietary BIOS/UEFI with open-source firmware eliminates potential backdoors at the deepest level.

Libreboot Guide​

Difficulty: Very Advanced | Cost: $15-30 (flashing hardware)

Fully open-source firmware that completely replaces proprietary BIOS and removes Intel Management Engine. Maximum transparency and security.

Best for: Users who want complete control and can verify the entire software stack.

Coreboot Guide​

Difficulty: Very Advanced | Cost: $0-30

Open-source firmware foundation. More hardware support than Libreboot but may retain some proprietary blobs.

Best for: Users who need open firmware on hardware not supported by Libreboot.


Setup Progression​

Build advanced capabilities in stages:

Stage 1: Foundation (Do First)​

  1. Hardware wallet β€” Basic self-custody
  2. Backup verification β€” Confirm recovery works
  3. Run your own node β€” Verify transactions yourself

Stage 2: Enhanced Security​

  1. Dedicated Bitcoin computer β€” Separate from daily use
  2. Security hardening β€” OpSec and physical security
  3. Inheritance planning β€” Don't let Bitcoin die with you

Stage 3: Advanced Protection​

  1. Air-gapped computer β€” For offline operations
  2. DIY seed generation β€” Verify your entropy

Stage 4: Maximum Security​

  1. Multisig setup β€” Eliminate single points of failure
  2. Open firmware β€” Remove BIOS-level threats

Choosing Your Path​

"I want to eliminate single points of failure"​

β†’ Multisig is your answer. Start with 2-of-3.

"I want my family to inherit my Bitcoin"​

β†’ Inheritance Planning β€” don't let your Bitcoin die with you.

"I want to generate my own seed securely"​

β†’ Air-gapped computer + DIY seed guide

"I want a clean environment for Bitcoin"​

β†’ Dedicated Bitcoin computer

"I want maximum possible security"​

β†’ All of the above, plus open firmware


Common Questions​

"Is multisig worth the complexity?"

For significant holdings (life-changing amounts), yes. The complexity cost is worth eliminating single points of failure. For smaller amounts, a well-secured single-sig setup is sufficient.

"Can I use an old laptop as an air-gapped computer?"

Yes! Old laptops are ideal. Disable WiFi/Bluetooth at the hardware level if possible (remove the card). See the air-gapped setup guide.

"Do I really need open-source firmware?"

For most users, no. Standard hardware wallets with good practices provide excellent security. Open firmware is for users with extreme threat models or those who want complete transparency.

"What about hardware wallets with secure elements vs. open source?"

Both approaches have merit. Secure elements provide tamper resistance. Open source provides auditability. Some devices (like Coldcard) offer both. See hardware wallet comparison.


Prerequisites​

Supporting Guides​