Self-custody security is shifting from protecting a secret to designing systems where the secret is useless to a thief. New wallets are being built not just to withstand digital attacks, but to make the physical theft of Bitcoin mathematically pointless.
On What Bitcoin Did, Jonathan Pollock detailed BitKey's vault system. It uses a 2-of-2 multisig with Block, requiring two biometric scans separated by a configurable time delay - days or weeks. The goal is to outlast an attacker's patience, as 99% of documented coercion attacks end within a week. Paradoxically, Pollock noted the final escape route might be sending funds to a KYC exchange, moving the battle from a knife point to an identity-verification process an attacker cannot win.
"The industry must design for a scenario where the attacker has full knowledge of your setup and the victim is compliant, yet the coins remain unreachable."
- Jonathan Pollock, What Bitcoin Did
Inheritance, the other major flaw in self-custody, is being automated on-chain. On Citadel Dispatch, Ben Kaufman explained how Bitcoin Keeper uses Miniscript absolute time-locks. An owner gives an heir a key that only activates after a set period, like two years. If the owner doesn't refresh the lock with an on-chain transaction, the heir gains access automatically, turning the Bitcoin protocol into a self-executing trust.
The underlying hardware is also being redesigned to eliminate the seed phrase, which Pollock calls an 'instant compromise' vector. BitKey keeps the private key strictly on the hardware, gated by a fingerprint. Meanwhile, on TFTC, Zach Herbert argued that Foundation's new operating system, KOS, uses hardware-level sandboxing to isolate apps, challenging Ledger's manual-review model. This aims to create a general-purpose security device where apps can't access the master seed, enabling innovation without centralized permission.
"Recovery is handled through a collaborative 2-of-3 setup where keys are distributed between the hardware, a phone app, and Block’s servers."
- Jonathan Pollock, What Bitcoin Did
The progression is clear: security is no longer a user's DIY project. It's being baked into protocols and hardware that protect users from both external coercion and their own errors.


