Security Practices

Dead Man's Switch

A dead man's switch is an automated mechanism that triggers a pre-defined action — such as transmitting recovery instructions or releasing access to Bitcoin — if the holder fails to check in within a set time period. It addresses the risk of sudden incapacitation or death.

How It Works

A dead man's switch requires the holder to perform a regular action — clicking a link, sending a message, or signing a transaction — at defined intervals. If the check-in is missed, the system assumes the holder is incapacitated and executes a pre-programmed response. In Bitcoin, this typically means sending recovery instructions, decryption keys, or partial multisig information to designated heirs or trustees.

Implementation varies in complexity. A simple version uses an encrypted email or document stored with a service that sends it to designated recipients after a period of inactivity. More sophisticated setups use Bitcoin's native timelock features, where a pre-signed transaction that sends funds to an heir's address becomes valid after a certain block height. The holder regularly updates this transaction with a new, future timelock, effectively resetting the switch. If the holder stops updating, the most recent pre-signed transaction eventually becomes spendable.

The challenge is balancing accessibility with security. The switch must be reliable enough to actually trigger when needed, but secure enough that it cannot be triggered prematurely or intercepted by an adversary. It should not require the heir to understand Bitcoin in advance — the instructions it delivers should be comprehensive enough for a non-technical person to follow, potentially with the help of a pre-arranged Bitcoin-savvy advisor. Testing the switch periodically (without actually triggering it) is essential to verify the entire mechanism works as intended.

Key Points

  • Automated fallback that releases Bitcoin access information if the holder fails to check in
  • Addresses the critical risk of sudden death or incapacitation with no one knowing your keys
  • Can use Bitcoin timelocks for on-chain enforcement without trusting third parties
  • Instructions must be comprehensive enough for non-technical recipients to follow
  • Must be tested periodically to ensure the mechanism actually works when needed