FAMILY SOVEREIGN INHERITANCE KIT
SOVEREIGN STACK EDITION – v1.0
0. Cover Page
Cover Page
Kit Name: Family Sovereign Inheritance Kit – Sovereign Stack Edition
Kit Version:v____.__
Date Activated:____ / ____ / ______
Owner:
Statement of Intent (fill in):
This kit defines how my Bitcoin and related self-custodied digital bearer assets
pass to my chosen heirs, under my own law and without reliance on custodians
or centralized services.
All instructions in this kit are binding expressions of my will. If there is any
conflict between this kit and any other document, the newest signed version of this
kit takes precedence for matters of key custody and operational control.
Owner Signature:Date:____ / ____ / ______
1. Kit Version & Funeral Log
Kit Version & Funeral Log
Purpose: Avoid confusion when multiple kits or drafts exist.
The latest signed version is the only one that counts.
Current Active Version:v____.__ (this kit)
Prior Kit Version
Status (Destroyed / Archived)
Date Retired
Reason Retired
Owner Signature
v____.__
v____.__
Canon Rule:
If multiple binders or versions are found, the kit with the highest version number and
most recent signature/date is authoritative. All prior versions are dead
and must not be used for recovery.
2. Quickstart
Quickstart for Heirs (Read This First)
If you are reading this because I am dead or incapacitated:
Stop. Do not type or photograph any secret.
Do not type seed phrases into websites or apps.
Do not upload anything to cloud services.
Confirm my status.
Confirm that I am truly deceased or permanently unable to manage my affairs (per local law / medical confirmation).
Contact the Technical Helpers.
Go to the Role Map (Section 3).
Contact at least two Technical Helpers.
Do not proceed alone or with a single outsider.
Locate the Binder and Packets.
Use the Inventory (Section 4) to find sealed packets (envelopes, metal plates, devices).
Do not open any sealed packet until at least 2 helpers are present.
Follow the Runbook for the Selected Module(s).
The Architecture Declaration (Section 5) tells you which Module(s) are active:
A – Singlesig
B – 2-of-3 Multisig
C – Timelocked Recovery
Use the matching Runbook in Section 12.
3. Role Map
Role Map
Purpose: Define who coordinates, who helps technically, and who inherits.
At least 2 Technical Helpers should be present for any operation involving secrets or broadcasting transactions.
Helper Role
Name
Contact Info
Notes
Helper 1
Helper 2
Helper 3
4. Inventory
Inventory (No Secrets)
Rule: No seed words, no passphrases, no xpubs here. Only packet IDs, types, and locations.
Packet Type Legend:
S – Seed / recovery phrase / Shamir share
P – Passphrase (if any)
D – Wallet config / descriptors / xpubs
K – Device (hardware wallet, signing tool, node disk)
Packet ID
Type (S/P/D/K)
Physical Location
Seal Date
Last Verified
Packet-____
Packet-____
Packet-____
Packets may be stored in different locations (home safe, offsite vault, trusted relative’s safe, buried capsule, etc.).
No single location should hold everything needed to steal the funds.
5. Architecture
Architecture Declaration (Modules)
Tick the modules actually in use and list which funds they protect.
5.1 Module Selection
Module A – Singlesig, No Passphrase Usage:
Small / day-to-day stash
Teaching / starter wallet
Other:
Module B – 2-of-3 Multisig (Core Sovereign Vault) Usage: Used as primary vault for main holdings
Purpose: Make explicit who can move what, with whom, and when for the primary vault (usually Module B).
Scenario
Who Holds Keys / Authority
Can They Move Funds While I’m Alive?
Can They Move Funds After I’m Dead?
Conditions / Notes
Me + Any One Helper
Yes / No
N/A
Spouse + Executor (without me)
Yes / No
Yes / No
Any Single Heir Alone
No
No
All Heirs Together (no outside ally)
Yes / No
Yes / No
Heir + Trusted Sovereign Ally
Yes / No
Yes / No
Executor + Any Non-Family Ally
Yes / No
Yes / No
Design this so that while you are alive, no combination of heirs alone can move the main vault unless you explicitly want that. After your death, the combination you choose can move the funds by following this kit.
7. Incapacity
Incapacity Clause
Choose how the kit behaves if you are incapacitated but not legally dead.
Option A – Treat Incapacity Like Death
If I am medically/legally incapacitated and cannot manage my affairs, my heirs may use this kit
as if I had died, to access and use my funds for my care and/or their inheritance.
Option B – Separate Care Vault
I will maintain a smaller separate wallet (“Care Vault”) for medical/care expenses with a simpler policy.
The main Sovereign Vault (Module B) remains locked until my actual death.
Notes / Clarifications:
8. Node
Node Inheritance Page
Your node is part of the family’s sovereign infrastructure.
Node Type / Hardware:
Location:
Node Software / Stack:
How to Start the Node:
Power on:
OS / login details (store securely or in another sealed packet if sensitive):
OS:
User:
Node startup command / procedure:
How to Connect Wallets:
Local network (IP or hostname):
Tor / onion address (if applicable):
If This Node Is Destroyed:
You can still recover funds using the wallet descriptors + seeds in the packets.
After recovery and sweeping to a new wallet, rebuild a new node using standard Bitcoin full node software.
Never write seed words, passphrases, or exact balances on the outside.
9.3 Example Packet Assignment
For Module B (2-of-3 Multisig):
S-B1: Seed for Signer #1 + printed copy of Packet D-B
S-B2: Seed for Signer #2 + printed copy of Packet D-B
S-B3: Seed for Signer #3 + printed copy of Packet D-B
D-B: Master policy descriptor(s) and all signer xpubs/fingerprints
For Module C (Timelock):
S-C1: Primary key seed
S-C2: Recovery key seed
D-C: Policy descriptor(s) with miniscript / timelock rules
10. Policy
Wallet Policy Record (Global)
This describes the wallet(s) governed by this kit. Fill one per wallet.
Wallet Name / Label:
Module: A / B / C
Network: mainnet
Address Type: (e.g., p2wpkh, p2wsh, p2tr)
Coordinator / Wallet Software:
Version (when created):
Descriptor(s) / Policy Text:
Change Descriptor (if different):
Quorum (e.g., 2-of-3):
This Policy Record and Packet D may reveal balances and transaction history.
Treat them as sensitive even though they cannot spend coins by themselves.
Derivation Path: (e.g., m/84'/0'/0' or m/48'/0'/0'/2')
Seed Backup Packet ID(s):
Passphrase Used for This Key? Yes / No
If Yes: Passphrase Packet ID:
Last Successfully Tested Signature (Date):____ / ____ / ______
12. Runbooks
Module Runbooks
12.1 Module A – Singlesig, No Passphrase
Goal: Recover funds from a simple single-key wallet.
Required:
Packet S-A1 (seed) (and S-A2 as backup)
A clean, offline-capable device
A FOSS wallet that supports BIP39 restore
(Preferred) Your own node, or a trusted node
Confirm legal/medical condition (death or incapacity as per Section 7).
Gather at least 2 Technical Helpers.
Retrieve Packet S-A1; inspect seal and signature.
Prepare an offline environment (airgapped laptop / bootable OS).
Open Packet S-A1 and enter the seed only into the offline wallet.
Reconstruct the wallet, then connect it to a node (preferably your node) as a watch-only or full wallet.
Fee & Privacy:
Start with a small test send to a new address controlled by heirs.
Avoid merging all UTXOs into a single address unless necessary.
After test succeeds, sweep remaining UTXOs to a new heir-controlled wallet.
Record in Rehearsal / Actions log (no secrets).
12.2 Module B – 2-of-3 Multisig Vault (Core)
Goal: Recover and spend from the primary multisig vault.
Minimum required:
Packet D-B (wallet policy / descriptors)
Any two of S-B1 / S-B2 / S-B3 (seeds + policy copies)
Two hardware devices (if devices were used) or new devices to restore onto
A FOSS multisig-capable coordinator (Sparrow, Specter, etc.)
A node (preferably yours; if none, see Emergency Path)
Confirm legal/medical condition.
Gather at least 2 Technical Helpers.
Retrieve Packet D-B and two S-Bx packets. Check seals.
In a controlled environment (preferably offline node-connected machine):
Import the descriptor(s) / policy from D-B into the coordinator.
Restore signer #1 from S-Bx and signer #2 from S-Bx using hardware devices or secure restore.
Connect coordinator to your node if available.
Verify that:
Known addresses match printed examples (if provided).
Balance / UTXOs look plausible.
Fee & Privacy:
Construct a small test transaction requiring 2 signatures, sending a small amount to a new heir-controlled wallet.
Broadcast it, verify confirmation.
Once confident, sweep remaining UTXOs to heir-controlled vault(s) or distribution addresses.
Use coin control where possible to avoid unnecessary UTXO merging.
Record the process and final disposition in the Actions log (no seed words).
12.3 Module C – Timelocked Recovery (Advanced / Optional)
WARNING: This is advanced and wallet-specific. The primary multisig vault must still be recoverable without relying on this module.
Goal: Let heirs recover funds via an on-chain timelocked path if the primary path is never used again.
Required:
Packet D-C (miniscript / descriptor policy)
Packet S-C2 (Recovery key seed)
Compatible wallet software (e.g., Liana or equivalent)
Node access (preferably yours)
Confirm legal condition and ensure timelock conditions are satisfied (block height / elapsed blocks since last spend).
Gather at least 2 Technical Helpers.
Retrieve Packet D-C and S-C2; inspect seals.
Import descriptor(s)/policy from D-C into the compatible wallet.
Restore the Recovery key from S-C2 on a signing device or secure environment.
Verify that the wallet sees the relevant UTXOs via watch-only.
Once the timelock has actually matured, construct recovery transactions from the timelocked path.
Broadcast, wait for confirmation, then sweep to heir-controlled vault(s).
Record the entire process in the Actions log.
13. Rehearsal
Rehearsal & Health Check Protocol
Frequency: At least annually, and whenever you change devices, software, or relationships.
13.1 Checklist
Inventory Check: All packets exist at listed locations (Section 4).
Seal Check: No signs of tampering, water damage, fire damage.
Paper Check: No fading, mold, or illegible text.
Metal Check: All characters legible; no ambiguous markings.
Policy Check: Wallet policy (descriptors, script type) in Section 10 still matches active wallet setup.
Signer Check: Each signer can still produce a valid test signature or tiny test transaction.
Node Check: Node starts, syncs, and is reachable.
Heir Education: At least one heir has had basic concepts explained and knows this kit exists.
13.2 Rehearsal Log
Date
Who Participated
What Was Tested
Issues Found
Actions Taken
Owner Signature
14. Forks
Fork Coins & Phishing Warning
These keys may control other coins on forked chains or derivative systems.
Heirs should assume all “claim your fork coins safely” services are hostile by default.
Any attempt to extract value from forks must happen only after:
Main BTC has been swept to a new wallet with a new seed, and
An experienced Bitcoiner is physically present.
If in doubt, ignore fork coins; losing the main BTC to a phishing tool is far worse than missing questionable fork value.
15. Helpers
Helper Authentication
Prevent impersonation of Technical Helpers.
Define at least one method per helper (shared phrase, in-person verification, etc.).
Helper 1:
Verification method:
Helper 2:
Verification method:
Helper 3:
Verification method:
Do not trust inbound emails, calls, or messages claiming to be a Helper without using the verification method.
If unsure, pause and get a second opinion from another helper / relative.
16. Emergency
Emergency Path: No Node, No Hardware
If your node and devices are destroyed, use descriptors + seeds from Packet D and Packet S
to reconstruct wallets on new hardware devices and a FOSS wallet on a clean machine.
Verify addresses against any printed known addresses you included (optional but recommended).
Temporarily connect to a reputable public server only if absolutely necessary, and only to sweep
funds to a new, safer setup. Then migrate to a self-hosted node as soon as possible.
Rebuild a node and restore a more sovereign environment once the emergency is over.
17. Legal
Sovereign Property Clause (To Attach to Will / Estate)
This is the legal-facing statement; it does not reveal keys.
I hold certain digital bearer assets (including Bitcoin) in self-custody, not via any bank or custodian.
These assets are controlled by cryptographic keys that are not stored with, and cannot be
recovered from, any financial institution.
My heirs are entitled to the value and control of these assets as defined in my will and this kit.
Access to the keys themselves is governed by the Family Sovereign Inheritance Kit –
Sovereign Stack Edition, which exists as a separate, private document outside institutional custody.
Signature (if included in estate docs):Date:____ / ____ / ______
18. Testament
Sovereign Testament (To Be Written by You)
This is the mythic + philosophical core. Write it yourself. It is not operational; it is contextual.
Suggested structure:
What Bitcoin Is (in your ontology)
Not just “money,” but what you know it to be.
Why This Kit Exists
Why you chose self-custody.
Why no custodial inheritance service.
The Sovereign Stack vs Synthetic Stack
A short explanation your heirs can understand.
Minimal Heir Guidance
If they choose to sell: how to do it carefully, without being fleeced.
If they choose to hold/build: how to align with the Sovereign Stack.
Write your Testament here (or attach as separate pages):
Owner Signature:Date:____ / ____ / ______
Place this Testament in a clearly labeled, sealed section at the front of the binder
with the instruction: “Read this Testament once before touching any operational step.”