Trustless Inheritance Solution

Pass On Your Bitcoin and Ethereum Assets to Your Family — No Lawyers, No Middlemen

Secure, automated, and decentralized estate planning for crypto.

How It Works?

All logic is enforced on-chain. No custodian, no company, no individual can move funds alone.

  1. Create a Threshold Multi-Sig

    Default: 2-of-3 (configurable). You generate three keys:
    Key A you keep.
    Key B you may later give to your heir.
    Key C is encrypted on your device and stored by the protocol (the protocol never sees the plaintext key).

    Result: While you are alive, you control all three keys and can always move your funds. After you pass a key to your heir and escrow one with the protocol, no single party (not your heir, nor the protocol) can access the funds alone.
  2. Your Heir Initiates a Claim

    When the time comes, your heir starts a claim (“trade”) on the protocol. A staked verifier pool is randomly selected and assigned to the case.

    Verifiers have funds at risk and are slashable for bad behavior.
  3. Waiting & Verification

    A waiting period begins — default 3 months (you can set longer). During this window, verifiers must contact you to confirm you are alive and object if needed. You can require extra evidence such as a death certificate.

    If you confirm you’re alive (on-chain signal), the claim is canceled.
  4. Automatic Release (If Conditions Met)

    If the waiting period elapses without your objection and all conditions are satisfied, the protocol enables a valid 2-of-3 signature path for your heir to receive the assets.

    Funds move only when quorum is satisfied; no one can bypass policy.
  5. Heir Readiness Kit (Offline)

    We provide step-by-step instructions to prepare a USB disk for your heir (wallet app, public info, recovery guides). The USB never contains your private key unencrypted.

Security Model
  • Trustless: Keys, policies, and claims enforced by smart contracts.
  • Key Privacy: Protocol stores only an encrypted key (never usable alone).
  • Quorum Required: No single party can move funds unilaterally.
  • Incentive Aligned: Verifiers are staked and slashable.
  • Auditability: All actions are visible on-chain, personal data stays off-chain.
Policy Options
  • • Waiting period: 3+ months (configurable).
  • • Extra documents: death certificate, notarized proof, etc.
  • • Multi-heir, multi-jurisdiction, and higher quorums (e.g., 3-of-5).
FAQ

You submit a simple on-chain objection (or respond to verifier outreach). The claim is canceled, funds remain in place.

No. The protocol only holds an encrypted key. Neither the protocol, a company, nor an individual can meet quorum alone.

No. You can choose higher thresholds (e.g., 3-of-5) or multiple heirs. The same trustless rules apply.

Yes. You can make release conditions stricter by requiring documents such as a death certificate in addition to the waiting period and verifier checks.

This app may generate private keys for heirs and the protocol-related escrow key entirely client-side in your browser. All cryptographic operations occur locally; plaintext keys are never transmitted. The codebase is open-source for transparency and auditability.

We use Safe (formerly Gnosis Safe), a widely adopted and well-audited multisig smart contract system. Learn more in the Safe documentation.

To bring BTC into an EVM policy, use an ERC‑20 representation:
  • wBTCWrapped Bitcoin (custodial): BTC is held by a custodian; you receive ERC‑20 wBTC on Ethereum.
  • tBTCtBTC (trustless): a decentralized bridge mints ERC‑20 tBTC backed by BTC without a single custodian.
Choose based on your trust preferences. In custodial models (e.g., wBTC), your BTC is held in custody; in trustless models (e.g., tBTC), custody is decentralized by protocol design.

For clarity and security, create a separate Safe (multisig wallet) for each heir or for each distinct group of assets (“packages”). This lets you:
  • Isolate risk: Each Safe holds its own assets and rules; issues in one do not affect others.
  • Customize thresholds: Use different owner sets or 2-of-3 policies per heir or package.
  • Allocate precisely: Fund each Safe with only the assets intended for that heir or package.
  • Simplify execution: Clear separation makes triggering claims and reviews per package straightforward.
In practice, repeat the setup flow to deploy multiple Safes—one per heir or package—then move the corresponding assets into each Safe.

No. Your private keys are never exposed. Only the attestors you assign can view your contact details and Safe information, and even they cannot see any of your private keys. Your sensitive data (e.g., Safe address and contact info) is stored on Ethereum as ciphertext, encrypted separately with each attestor’s public key. The public can only see encrypted blobs; only your selected attestors can decrypt their copy.