
Self-custody means you hold the keys. That is the point — and it is also the problem the day someone else needs those keys and you are not there to hand them over. If you are hit by a bus, suffer a stroke, or simply lose the mental sharpness to walk a relative through a recovery, your crypto does not pause politely until you recover. It sits on-chain, untouchable, while the people you wanted to provide for stare at a wallet they cannot open.
Crypto inheritance planning is the work of solving that puzzle in advance. The hard part is a genuine contradiction: your heirs need a reliable path to the funds, but a seed phrase written somewhere findable is a seed phrase a thief can find too. This article walks through practical approaches and is honest about the trade-offs of each. It is planning guidance, not legal advice — for the legal mechanics of a will or trust, work with a qualified estate attorney in your jurisdiction.
Why "just write it down" fails both ways
The instinct is to scribble the seed phrase on paper, put it in a drawer, and tell a family member where to look. This fails in two opposite directions at once.
If the note is easy enough for a grieving, non-technical relative to find and use, it is also easy for a burglar, a dishonest contractor, or a curious houseguest to find and use — while you are still very much alive. You have quietly converted self-custody into a single sheet of paper anyone with physical access can photograph.
If instead you hide the note well — a buried container, a cryptic clue, a safe whose combination lives only in your head — you have built a system that depends on you being available to explain it. The exact failure you are planning for is the failure that erases the explanation.
A workable plan has to thread between these two. The recurring trick is to separate the instructions from the secret. Instructions can be detailed, plain-language, and stored somewhere your family will actually look. The secret they point to stays protected by something more than the instructions themselves.
Documented instructions that point to secrets, not expose them
Start with a "crypto access letter" — a plain document, kept with your other estate paperwork, that a non-technical person can follow. It should not contain the seed phrase. Instead it explains:
- That crypto assets exist, roughly what they are, and that they have real value.
- Which wallet software is involved (for example, SSP Wallet) and that it uses a two-key setup, so one secret alone is not enough.
- Where each piece of the puzzle physically lives — "the steel backup is in the safe deposit box at [bank]", "the SSP Key phone is in the bedroom safe" — without writing the seed words or PINs into the letter itself.
- Who to contact for help, and a warning to never type the recovery words into a website or send them to anyone claiming to be support.
The letter is findable on purpose. Its value to a thief is low, because by itself it unlocks nothing — it is a map, not a key. Its value to your family is high, because it turns "Dad had some Bitcoin somewhere" into a concrete checklist. Review it whenever your setup changes; a letter pointing at a wallet you stopped using is worse than no letter.
Splitting knowledge across trusted parties
A second approach removes the single point of failure entirely: no one person holds enough to move the funds alone.
The straightforward version is to physically split a seed-phrase backup — for example, words 1–12 with one trusted person and words 13–24 with another, with instructions that they must combine the halves. Anyone holding one half learns nothing useful. Only when your heirs cooperate, after you are gone, do the pieces come together.
The trade-off is real. Naive splitting reduces security against a partial loss: lose one half and the whole backup is gone. It also assumes the holders stay reachable, stay trustworthy, and do not fall out with each other. Purpose-built schemes such as Shamir's Secret Sharing improve on naive splitting — they let you require, say, any 3 of 5 shares, so the plan survives a lost or uncooperative shareholder — but they add complexity your heirs must understand. Choose splitting only if the people involved are genuinely reliable and you have written down, clearly, how the pieces recombine.
Time-locked and lawyer-held envelopes
You can also hand the secret to a neutral third party under conditions. A sealed envelope held by your estate attorney, released only on presentation of a death certificate, is a low-tech version that has worked for centuries with other assets. The lawyer is bound by professional duty and does not have a reason to open it early.
More technical options exist. Some setups use a dead-man's-switch service or a time-locked transaction that becomes spendable only after a deadline you keep pushing back while you are alive. These are powerful but fragile: if the service shuts down, or you forget to check in, the mechanism can fire early or never. Treat any automated scheme as something to test, document, and revisit yearly — not set-and-forget.
The honest summary: a lawyer-held envelope trades some secrecy (the lawyer's firm is now part of your threat model) for reliability and legal grounding. A purely technical time-lock trades legal grounding for not trusting any person — at the cost of depending on software still running years from now.
How a 2-of-2 setup can structure emergency access
A two-key wallet such as SSP changes the shape of the problem in a useful way. Because moving funds already requires two separate factors — the browser key and the SSP Key on a phone — you can design inheritance around that split instead of fighting it.
One practical pattern: arrange for a trusted heir to end up with one factor — say, the device or backup for the SSP Key — while the instructions for obtaining or restoring the second factor are documented separately, perhaps in the lawyer-held letter. Neither the heir alone nor the letter alone is enough. Together, after you are gone, they reconstruct full access. This mirrors how a 2-of-2 protects you in life: a thief who compromises one factor still cannot move money.
The 2-of-2 does not remove the need for a plan — your heirs still need clear, current instructions — but it gives you a natural seam along which to split knowledge, without inventing a custom secret-sharing scheme. To understand what each factor actually does, read Recovery 101: What You Actually Need to Restore a Wallet.
Building the plan: a practical checklist
- Inventory. List every wallet, the assets in each, and where the backups physically are. Keep it with your estate documents and current.
- Separate instructions from secrets. The letter your family finds should point to secrets, never contain them.
- Pick one access method and document it fully. Splitting, a lawyer-held envelope, or a 2-of-2-structured handoff — clarity beats cleverness. An heir following the plan under stress should not have to guess.
- Name a technically capable helper — someone trusted who understands wallets and can sit with your family.
- Protect the backup itself. Inheritance planning does not replace good seed-phrase hygiene; review Seed Phrase Best Practices so the secret you are passing on is sound.
- Review yearly. Devices, balances, and relationships change; a stale plan can be worse than none.
- Get the legal layer right. Coordinate the technical handoff with an estate attorney so the will and the wallet plan agree.
For a deeper, structured treatment of inheritance for self-custodied crypto, the Casa inheritance documentation is a useful neutral reference on how dedicated key-management providers approach the same trade-offs.
The goal: access for them, not exposure for you
Crypto inheritance planning is uncomfortable because it forces you to imagine your own absence. But the alternative — funds permanently frozen behind a secret only you knew — is the outcome nobody wants. The reachable goal is modest and concrete: a plan where the people you trust can get to the funds when they genuinely need to, and no one else can before then. Separate the instructions from the secret, pick one method and document it well, lean on the 2-of-2 split you already have, and revisit it once a year. That is enough to keep self-custody from becoming a dead end for the people you were trying to protect.
