FAMILY SOVEREIGN INHERITANCE KIT SOVEREIGN STACK EDITION – v1.0


0. Cover Page

Cover Page

Kit Name: Family Sovereign Inheritance Kit – Sovereign Stack Edition

Kit Version: v____.__

Date Activated: ____ / ____ / ______

Owner:

Statement of Intent (fill in):

This kit defines how my Bitcoin and related self-custodied digital bearer assets pass to my chosen heirs, under my own law and without reliance on custodians or centralized services.

All instructions in this kit are binding expressions of my will. If there is any conflict between this kit and any other document, the newest signed version of this kit takes precedence for matters of key custody and operational control.

Owner Signature: Date: ____ / ____ / ______


1. Kit Version & Funeral Log

Kit Version & Funeral Log

Purpose: Avoid confusion when multiple kits or drafts exist. The latest signed version is the only one that counts.

Current Active Version: v____.__ (this kit)

Prior Kit Version Status (Destroyed / Archived) Date Retired Reason Retired Owner Signature
v____.__
v____.__
Canon Rule:
If multiple binders or versions are found, the kit with the highest version number and most recent signature/date is authoritative. All prior versions are dead and must not be used for recovery.

2. Quickstart

Quickstart for Heirs (Read This First)

If you are reading this because I am dead or incapacitated:

  1. Stop. Do not type or photograph any secret.
  2. Confirm my status.
  3. Contact the Technical Helpers.
  4. Locate the Binder and Packets.
  5. Follow the Runbook for the Selected Module(s).

3. Role Map

Role Map

Purpose: Define who coordinates, who helps technically, and who inherits.

3.1 Primary Roles

Owner (Me):
Name:
Primary Contact (while alive):

Executor / Coordinator (after death/incapacity):
Name:
Contact info:

Legal Heirs / Beneficiaries (names only):

Role / Relationship Name Notes
Spouse / Partner
Child 1
Child 2
Other

3.2 Technical Helpers

At least 2 Technical Helpers should be present for any operation involving secrets or broadcasting transactions.
Helper Role Name Contact Info Notes
Helper 1
Helper 2
Helper 3

4. Inventory

Inventory (No Secrets)

Rule: No seed words, no passphrases, no xpubs here. Only packet IDs, types, and locations.

Packet Type Legend:

Packet ID Type (S/P/D/K) Physical Location Seal Date Last Verified
Packet-____
Packet-____
Packet-____

Packets may be stored in different locations (home safe, offsite vault, trusted relative’s safe, buried capsule, etc.). No single location should hold everything needed to steal the funds.


5. Architecture

Architecture Declaration (Modules)

Tick the modules actually in use and list which funds they protect.

5.1 Module Selection

Module A – Singlesig, No Passphrase
Usage:
Small / day-to-day stash
Teaching / starter wallet
Other:


Module B – 2-of-3 Multisig (Core Sovereign Vault)
Usage: Used as primary vault for main holdings


Module C – Timelocked Recovery / Miniscript (Advanced, Optional)
Usage:
Heir-only delayed recovery path
Backup “I disappear” failsafe
Other:

5.2 Buckets (Optional)

Bucket Name Approx % of BTC Module(s) Used Notes
Operational
Core Vault
Long-Term

6. Authority

Collusion & Authority Matrix

Purpose: Make explicit who can move what, with whom, and when for the primary vault (usually Module B).
Scenario Who Holds Keys / Authority Can They Move Funds While I’m Alive? Can They Move Funds After I’m Dead? Conditions / Notes
Me + Any One Helper Yes / No N/A
Spouse + Executor (without me) Yes / No Yes / No
Any Single Heir Alone No No
All Heirs Together (no outside ally) Yes / No Yes / No
Heir + Trusted Sovereign Ally Yes / No Yes / No
Executor + Any Non-Family Ally Yes / No Yes / No

Design this so that while you are alive, no combination of heirs alone can move the main vault unless you explicitly want that. After your death, the combination you choose can move the funds by following this kit.


7. Incapacity

Incapacity Clause

Choose how the kit behaves if you are incapacitated but not legally dead.

Option A – Treat Incapacity Like Death
If I am medically/legally incapacitated and cannot manage my affairs, my heirs may use this kit as if I had died, to access and use my funds for my care and/or their inheritance.

Option B – Separate Care Vault
I will maintain a smaller separate wallet (“Care Vault”) for medical/care expenses with a simpler policy. The main Sovereign Vault (Module B) remains locked until my actual death.

Notes / Clarifications:


8. Node

Node Inheritance Page

Your node is part of the family’s sovereign infrastructure.

Node Type / Hardware:

Location:

Node Software / Stack:

How to Start the Node:

  1. Power on:
  2. OS / login details (store securely or in another sealed packet if sensitive):
    OS:
    User:
  3. Node startup command / procedure:

How to Connect Wallets:
Local network (IP or hostname):
Tor / onion address (if applicable):

If This Node Is Destroyed:


9. Packets

Packets & Labeling Protocol

9.1 Packet Types

9.2 Labeling Rules

9.3 Example Packet Assignment

For Module B (2-of-3 Multisig):

For Module C (Timelock):


10. Policy

Wallet Policy Record (Global)

This describes the wallet(s) governed by this kit. Fill one per wallet.

Wallet Name / Label:

Module: A / B / C

Network: mainnet

Address Type: (e.g., p2wpkh, p2wsh, p2tr)

Coordinator / Wallet Software:

Version (when created):

Descriptor(s) / Policy Text:

Change Descriptor (if different):

Quorum (e.g., 2-of-3):

This Policy Record and Packet D may reveal balances and transaction history. Treat them as sensitive even though they cannot spend coins by themselves.


11. Signers

Signer Records (One Per Key)

Signer Label: (Key 1 / Key 2 / Key 3 / Primary / Recovery)

Device Model:

Master Fingerprint:

XPUB (or equivalent):

Derivation Path: (e.g., m/84'/0'/0' or m/48'/0'/0'/2')

Seed Backup Packet ID(s):

Passphrase Used for This Key? Yes / No
If Yes: Passphrase Packet ID:

Last Successfully Tested Signature (Date): ____ / ____ / ______


12. Runbooks

Module Runbooks

12.1 Module A – Singlesig, No Passphrase

Goal: Recover funds from a simple single-key wallet.

Required:

  1. Confirm legal/medical condition (death or incapacity as per Section 7).
  2. Gather at least 2 Technical Helpers.
  3. Retrieve Packet S-A1; inspect seal and signature.
  4. Prepare an offline environment (airgapped laptop / bootable OS).
  5. Open Packet S-A1 and enter the seed only into the offline wallet.
  6. Reconstruct the wallet, then connect it to a node (preferably your node) as a watch-only or full wallet.
  7. Fee & Privacy:
  8. After test succeeds, sweep remaining UTXOs to a new heir-controlled wallet.
  9. Record in Rehearsal / Actions log (no secrets).

12.2 Module B – 2-of-3 Multisig Vault (Core)

Goal: Recover and spend from the primary multisig vault.

Minimum required:

  1. Confirm legal/medical condition.
  2. Gather at least 2 Technical Helpers.
  3. Retrieve Packet D-B and two S-Bx packets. Check seals.
  4. In a controlled environment (preferably offline node-connected machine):
  5. Connect coordinator to your node if available.
  6. Verify that:
  7. Fee & Privacy:
  8. Once confident, sweep remaining UTXOs to heir-controlled vault(s) or distribution addresses.
  9. Record the process and final disposition in the Actions log (no seed words).

12.3 Module C – Timelocked Recovery (Advanced / Optional)

WARNING: This is advanced and wallet-specific. The primary multisig vault must still be recoverable without relying on this module.

Goal: Let heirs recover funds via an on-chain timelocked path if the primary path is never used again.

Required:

  1. Confirm legal condition and ensure timelock conditions are satisfied (block height / elapsed blocks since last spend).
  2. Gather at least 2 Technical Helpers.
  3. Retrieve Packet D-C and S-C2; inspect seals.
  4. Import descriptor(s)/policy from D-C into the compatible wallet.
  5. Restore the Recovery key from S-C2 on a signing device or secure environment.
  6. Verify that the wallet sees the relevant UTXOs via watch-only.
  7. Once the timelock has actually matured, construct recovery transactions from the timelocked path.
  8. Broadcast, wait for confirmation, then sweep to heir-controlled vault(s).
  9. Record the entire process in the Actions log.

13. Rehearsal

Rehearsal & Health Check Protocol

Frequency: At least annually, and whenever you change devices, software, or relationships.

13.1 Checklist

13.2 Rehearsal Log

Date Who Participated What Was Tested Issues Found Actions Taken Owner Signature

14. Forks

Fork Coins & Phishing Warning

These keys may control other coins on forked chains or derivative systems.
  1. Heirs should assume all “claim your fork coins safely” services are hostile by default.
  2. Any attempt to extract value from forks must happen only after:
  3. If in doubt, ignore fork coins; losing the main BTC to a phishing tool is far worse than missing questionable fork value.

15. Helpers

Helper Authentication

Prevent impersonation of Technical Helpers.

Define at least one method per helper (shared phrase, in-person verification, etc.).

Helper 1:
Verification method:

Helper 2:
Verification method:

Helper 3:
Verification method:

Do not trust inbound emails, calls, or messages claiming to be a Helper without using the verification method. If unsure, pause and get a second opinion from another helper / relative.


16. Emergency

Emergency Path: No Node, No Hardware

  1. If your node and devices are destroyed, use descriptors + seeds from Packet D and Packet S to reconstruct wallets on new hardware devices and a FOSS wallet on a clean machine.
  2. Verify addresses against any printed known addresses you included (optional but recommended).
  3. Temporarily connect to a reputable public server only if absolutely necessary, and only to sweep funds to a new, safer setup. Then migrate to a self-hosted node as soon as possible.
  4. Rebuild a node and restore a more sovereign environment once the emergency is over.

17. Legal

Sovereign Property Clause (To Attach to Will / Estate)

This is the legal-facing statement; it does not reveal keys.

I hold certain digital bearer assets (including Bitcoin) in self-custody, not via any bank or custodian. These assets are controlled by cryptographic keys that are not stored with, and cannot be recovered from, any financial institution.

My heirs are entitled to the value and control of these assets as defined in my will and this kit. Access to the keys themselves is governed by the Family Sovereign Inheritance Kit – Sovereign Stack Edition, which exists as a separate, private document outside institutional custody.

Signature (if included in estate docs): Date: ____ / ____ / ______


18. Testament

Sovereign Testament (To Be Written by You)

This is the mythic + philosophical core. Write it yourself. It is not operational; it is contextual.

Suggested structure:

  1. What Bitcoin Is (in your ontology)
  2. Why This Kit Exists
  3. The Sovereign Stack vs Synthetic Stack
  4. Minimal Heir Guidance

Write your Testament here (or attach as separate pages):

Owner Signature: Date: ____ / ____ / ______

Place this Testament in a clearly labeled, sealed section at the front of the binder with the instruction: “Read this Testament once before touching any operational step.”