Self-Custody Guides
Step-by-step tutorials for securing your Bitcoin. From beginner seed generation to advanced air-gapped setups.
🔐 Security & Keys
Generate and protect your Bitcoin keys with verifiable randomness
DIY Seed Generation
Create your own cryptographically secure seed using dice. True randomness, fully offline.
💰 $30-80 (dice + metal backup)
DIY Passphrase
Add a strong passphrase layer and learn best practices for creating and managing it.
💰 $0-10 (dice optional)
Hardware Wallet Setup
Step-by-step guide to setting up your first hardware wallet securely.
💰 $70-250 (hardware wallet)
Backup Verification
Test that your seed backup actually works before trusting it with significant funds.
💰 Free
Multisig Setup
Eliminate single points of failure with multi-signature wallets. The ultimate security for significant holdings.
💰 $230-510 (3 HWWs + backups)
🕵️ Privacy
Techniques to enhance your financial privacy on Bitcoin
CoinJoin
Break the link between your transaction history and your coins using CoinJoin mixing.
💰 Variable (mixing fees)
PayJoin
Stealth privacy that breaks blockchain analysis assumptions. Both sender and receiver contribute inputs.
💰 Free (normal tx fees)
UTXO Management
Master coin control, consolidation, and labeling to minimize fees and protect privacy.
💰 Free (knowledge only)
💻 Hardware & Firmware
Build dedicated devices with open-source firmware for maximum security
Bitcoin Computer
Build a dedicated Bitcoin workstation designed for strong security and privacy.
💰 $50-150 or free (repurpose)
Air-Gapped Computer
Set up an offline computer for maximum security: seed generation, verification, and signing.
💰 $50-200 or free (repurpose)
Libreboot
Install Libreboot to replace your BIOS with fully open-source firmware and remove Intel ME.
💰 $15-30 (flashing hardware)
Coreboot
Learn Coreboot fundamentals and why open firmware matters for security-minded setups.
💰 $0-30 (depends on method)
🌐 Nodes & Network
Run your own infrastructure to verify transactions privately
🎁 Bonus Projects
Additional projects using the same security principles