You mine your own Bitcoin. You run your own node. You hold your own keys. But what happens to all of that when you die?
This is the question most Bitcoiners avoid until it is too late. In 2026, with the network hashrate surpassing 800 EH/s and each block reward delivering 3.125 BTC, the sats you stack through solo mining or pool payouts represent real, hard-earned value. Losing access to that value because of poor inheritance planning is not just unfortunate — it is a failure of the same self-sovereignty principles that led you to mine in the first place.
Traditional inheritance methods were designed for a world of banks, intermediaries, and court orders. Bitcoin exists outside that world by design. Your private keys cannot be subpoenaed from a server, recovered through a help desk, or accessed by your executor unless you plan for it. This is where Shamir’s Secret Sharing — commonly called Shamir Backup — becomes essential. It is a cryptographic tool that lets you split your seed phrase into multiple shares, requiring only a subset of those shares to reconstruct the original. No single share reveals anything. No single person holds enough power to steal your stack. And your heirs can still recover your Bitcoin when the time comes.
At D-Central Technologies, we have been in the Bitcoin mining space since 2016. As Canada’s leading Bitcoin mining company and pioneer Bitaxe manufacturer, we help miners at every stage — from purchasing hardware to repairing ASICs to understanding the full lifecycle of the sats they earn. Securing your mined Bitcoin for the next generation is part of that lifecycle.
Why Bitcoin Inheritance Is Different From Everything Else
When someone dies with a bank account, the process is straightforward. The executor presents a death certificate, the bank cooperates, and funds are distributed. It is slow and bureaucratic, but it works because banks are centralized custodians that respond to legal authority.
Bitcoin does not work this way. There is no customer service number for the Bitcoin network. There is no “forgot password” flow. The entire security model is built on the premise that whoever holds the private key controls the funds — and nobody else can. This is the feature, not the bug. But it means inheritance planning for Bitcoin requires entirely different thinking.
The Core Problem for Miners
As a home miner, your situation is often more complex than the average Bitcoin holder. Consider what you might have:
- Multiple wallets — a hot wallet for pool payouts, a cold storage wallet for long-term holdings, maybe a separate wallet for solo mining with your Bitaxe
- Hardware wallets — one or more devices with their own seed phrases and PINs
- Mining infrastructure — ASICs, power supplies, networking equipment, possibly a hosting arrangement with associated credentials
- Node and software configurations — your Bitcoin node, mining pool accounts, firmware settings
Each of these represents a separate access point that your heirs need to know about and be able to reach. A single seed phrase written on a piece of paper in a safe deposit box is not going to cut it — and even if it were sufficient, it creates a massive single point of failure.
What Goes Wrong With Traditional Approaches
| Method | Risk | Why It Fails for Bitcoin |
|---|---|---|
| Seed phrase in a safe | Single point of failure | Fire, flood, or theft destroys access permanently |
| Seed phrase in a will | Public exposure | Wills become public record during probate — your keys are exposed to anyone |
| Give seed phrase to spouse | Trust concentration | Relationship changes, coercion, or their own death creates cascading failure |
| Custodial exchange | Not your keys | Defeats the entire purpose of self-custody and mining your own Bitcoin |
| Encrypted USB drive | Password dependency | If the password is lost or the drive degrades, access is gone |
Every one of these methods either concentrates too much trust in a single point or exposes your keys to unnecessary risk. Bitcoin demands a better approach.
Shamir’s Secret Sharing: The Cryptographic Solution
In 1979, Israeli cryptographer Adi Shamir — co-inventor of the RSA encryption algorithm — published a paper describing a method for splitting a secret into multiple pieces such that only a predefined subset of those pieces could reconstruct the original. The mathematical foundation is polynomial interpolation: a polynomial of degree t-1 is uniquely determined by t points, so you need at least t shares to recover the secret, and t-1 or fewer shares reveal absolutely nothing.
This is not a new or experimental concept. Shamir’s Secret Sharing has been a cornerstone of cryptographic security for over four decades. What has changed is its accessibility — modern hardware wallets and open-source tools now make it practical for individual Bitcoiners to use.
How It Works in Practice
Here is the basic flow for a 3-of-5 Shamir Backup, which is one of the most common configurations:
- You generate your wallet seed phrase as normal — typically 12 or 24 words using BIP-39
- The Shamir tool splits that seed into 5 separate shares, each of which looks like its own set of words or data
- You distribute those 5 shares to different people and/or locations
- Any 3 of those 5 shares can reconstruct the original seed phrase
- Fewer than 3 shares reveal nothing — not even partial information about the seed
The elegance is in the math. This is not like splitting a password into three pieces where each piece gives you a third of the information. With Shamir’s scheme, holding 2 out of 3 required shares gives you zero information about the secret. The threshold is absolute.
Common Configurations
| Scheme | Total Shares | Required to Recover | Best For |
|---|---|---|---|
| 2-of-3 | 3 | 2 | Small holdings, simple family structure |
| 3-of-5 | 5 | 3 | Most home miners — good balance of security and recoverability |
| 4-of-7 | 7 | 4 | Larger holdings, distributed family, higher security needs |
| 5-of-9 | 9 | 5 | Institutional or multi-generational planning |
For most home miners, 3-of-5 hits the sweet spot. You can lose two shares entirely and still recover. No single person or location holds enough to compromise your funds. And the reconstruction process is straightforward enough that non-technical heirs can follow documented instructions.
Tools That Support Shamir Backup
Not every wallet supports Shamir’s Secret Sharing natively. Here are the primary tools available in 2026:
Trezor Model T / Trezor Safe
Trezor was the first major hardware wallet manufacturer to implement Shamir Backup natively, calling it SLIP-39 (Satoshi Labs Improvement Proposal 39). When you initialize a Trezor Model T or Trezor Safe, you can choose to generate a Shamir Backup instead of a standard BIP-39 seed phrase. The device guides you through creating your shares and lets you set the threshold scheme. Each share is a set of 20 or 33 words from a dedicated SLIP-39 wordlist (different from BIP-39).
SeedXOR (Coldcard)
Coldcard uses a different but conceptually similar approach called SeedXOR. Rather than Shamir’s polynomial interpolation, SeedXOR splits a seed using XOR operations. The result is similar — multiple shares that must be combined to recover the seed — but the mathematical properties differ. SeedXOR is simpler but does not have the same threshold flexibility (all shares are required, not a subset).
Open-Source Software Tools
Several open-source implementations of Shamir’s Secret Sharing exist for those who prefer software-only solutions. Tools like iancoleman’s Shamir39 and SLIP-39 Python libraries allow you to generate shares on an air-gapped computer. However, software-only approaches require more technical skill and careful operational security — running them on an internet-connected machine defeats the purpose entirely.
Multisig as an Alternative
It is worth noting that multisignature (multisig) wallets offer a different approach to the same problem. Instead of splitting a single seed phrase, multisig uses multiple independent keys that must sign a transaction together. A 2-of-3 multisig wallet requires any 2 of 3 separate keys to authorize a transaction. Multisig has the advantage of being enforced at the Bitcoin protocol level, but it is more complex to set up and manage — especially for heirs who may not be technically savvy.
For most home miners focused on inheritance planning, Shamir Backup is the more practical choice. Your heirs reconstruct one seed phrase and access one wallet, rather than needing to coordinate multiple signing devices.
Building Your Bitcoin Inheritance Plan: A Practical Guide
Theory is fine. Here is how to actually do it.
Step 1: Inventory Your Bitcoin Holdings
Before you can plan your inheritance, you need a clear picture of what you hold and where. Create a comprehensive inventory that includes:
- All wallets (hardware, software, paper) and their purposes
- The approximate value or UTXO count in each (you do not need exact amounts, but your heirs need to know which wallets matter)
- Mining pool accounts and their payout addresses
- Any hosted mining arrangements and associated credentials
- Your Bitcoin node details (if your heirs might want to continue running it)
- Hardware wallet PINs and passphrases (separate from seed phrases)
Store this inventory document separately from your seed shares. It should describe what exists and where, without containing the actual keys to access anything.
Step 2: Choose Your Shamir Configuration
For a typical home miner with a family, a 3-of-5 scheme works well. Here is an example distribution:
- Share 1: Your spouse or partner (kept at home in a secure location)
- Share 2: A trusted family member (sibling, parent, adult child)
- Share 3: Your personal safe deposit box at a bank
- Share 4: A second geographic location (vacation property, parents’ house, another city)
- Share 5: A trusted friend or your estate lawyer’s secure storage
The key principles: geographic diversity (no natural disaster takes out multiple shares), relationship diversity (no single family conflict compromises enough shares), and reasonable accessibility (your heirs can actually gather 3 shares without an unreasonable effort).
Step 3: Generate and Record Your Shares
- Initialize your hardware wallet with Shamir Backup enabled (on Trezor, this is a setup option)
- Write each share on a metal backup plate — paper degrades, metal survives fire and water
- Label each share clearly (e.g., “Share 1 of 5 — requires 3 shares to recover”) but do NOT label it with your name or what it protects
- Verify the backup by performing a test recovery before distributing shares
Step 4: Create the Instruction Document
Your heirs likely do not know what Shamir’s Secret Sharing is. Write a plain-language instruction document that covers:
- What Bitcoin is and that you hold some (basic context)
- That your Bitcoin is protected by a split backup requiring 3 of 5 shares
- Who holds each share and how to contact them
- Step-by-step instructions for combining the shares (which device to use, which software)
- What to do with the Bitcoin once recovered (recommended wallets, exchanges if they want to sell, tax implications)
- Who to contact for technical help — a trusted Bitcoiner friend, or a company like D-Central’s consulting service
Store this document with your will or estate documents. It does not contain any secret information — just the roadmap for your heirs to follow.
Step 5: Maintain the System
An inheritance plan is not a set-and-forget operation. Review it annually:
- Are all share holders still alive, trustworthy, and reachable?
- Have you moved any shares? Are the storage locations still secure?
- Has your Bitcoin holdings structure changed significantly?
- Does your instruction document still reflect your current setup?
- Have any of your heirs gained enough technical knowledge to take on a more active role?
Security Considerations for Miners
Home miners face some unique security considerations that go beyond simple key management.
Operational Security of Mining Equipment
Your mining hardware — whether it is a Bitaxe solo miner on your desk or a fleet of S21s in your garage — is a physical indicator that you hold Bitcoin. Anyone who sees your mining setup knows you are accumulating sats. This makes operational security around your mining operation a component of your inheritance security.
Consider:
- Who knows about your mining operation?
- Is your payout address linked to your cold storage, or do you use an intermediate wallet?
- Could physical access to your miner reveal your wallet addresses through pool configuration?
Passphrase Protection
Many hardware wallets support an optional passphrase (sometimes called the “25th word”) that acts as an additional layer of protection on top of the seed phrase. If you use a passphrase, your Shamir shares protect only the seed — your heirs also need the passphrase. Document this clearly. A common approach is to include the passphrase in your instruction document (which is stored separately from the shares) or to use a second, simpler Shamir split for the passphrase itself.
The Wrench Attack Consideration
One often-overlooked advantage of Shamir Backup is its resistance to physical coercion — the so-called “$5 wrench attack.” If someone threatens you to hand over your Bitcoin, you can honestly say that you do not have the ability to access it alone. You need shares from multiple other people in multiple locations. This is not just an inheritance feature — it is a real-time security feature for anyone holding meaningful amounts of Bitcoin.
Legal Considerations in Canada and Beyond
While this article focuses on the technical solution, the legal framework matters too. In Canada, Bitcoin is treated as property for estate purposes. This means it is subject to capital gains tax on deemed disposition at death — your estate will owe taxes on the appreciation of your Bitcoin holdings up to the date of death.
Key legal points:
- Include Bitcoin in your will — reference it as “digital assets” or “Bitcoin holdings” without including the actual keys
- Appoint a tech-savvy executor or co-executor who understands Bitcoin, or specify in your will that a Bitcoin-knowledgeable consultant should be engaged
- Consider a letter of wishes — a non-binding but instructive document that accompanies your will, detailing your Bitcoin setup and how to access it
- Tax planning — work with an accountant who understands Bitcoin taxation to minimize the estate’s tax burden
- Provincial variations — estate law varies by province in Canada, so ensure your plan accounts for your specific jurisdiction
For miners specifically, the ongoing nature of mining income adds complexity. If your ASICs are still running when you die, someone needs to manage or shut down the operation, handle the continued payouts, and deal with the electricity costs. Document all of this in your instruction document.
What Happens If You Do Nothing
The consequences of failing to plan are not hypothetical. An estimated 3 to 4 million Bitcoin are permanently lost — many because owners died without leaving access instructions. At current valuations, that represents hundreds of billions of dollars in value that is simply gone, locked in UTXOs that will never move again.
For a home miner, the scenario is particularly painful. You spent money on hardware. You paid the electricity bills. You dealt with the noise, the heat, the firmware updates, the pool configurations. You earned every sat through proof of work. And then, because you did not spend a few hours setting up a proper inheritance plan, all of it becomes inaccessible to the people you care about.
Do not let that be your story.
Getting Started Today
You do not need to build a perfect system on day one. Start with these immediate steps:
- Write down what you have — create that inventory document today, even if it is rough
- Tell someone Bitcoin exists — at minimum, one trusted person should know you hold Bitcoin and that there is a plan to access it
- Research hardware wallets with Shamir support — if you are not already using one, it is time to upgrade your key management
- Set a deadline — give yourself 30 days to implement the full Shamir Backup plan
If you need help with any aspect of your mining operation — from repairing your ASICs to understanding the best dual-purpose mining and heating setup to getting expert consulting on your overall mining strategy — D-Central Technologies has been helping Canadian and international Bitcoin miners since 2016. We are the Bitcoin Mining Hackers, and we believe that true self-sovereignty means planning for every scenario — including the one where you are no longer around.
Every hash counts. Make sure your heirs can count them too.
Frequently Asked Questions
What is Shamir Backup and how does it protect my Bitcoin inheritance?
Shamir Backup is a cryptographic method based on Shamir’s Secret Sharing that splits your Bitcoin wallet seed phrase into multiple shares. A predefined number of those shares — for example, 3 out of 5 — must be combined to reconstruct the original seed. No single share reveals any information about the seed on its own, which means no single person or location can compromise your Bitcoin. For inheritance, this means your heirs can recover your funds by gathering the required threshold of shares without any single heir having unilateral access.
Which hardware wallets support Shamir Backup natively?
As of 2026, the Trezor Model T and Trezor Safe series support Shamir Backup natively through the SLIP-39 standard. Coldcard offers a similar capability called SeedXOR, though it requires all shares rather than a threshold subset. There are also open-source software tools that implement Shamir’s Secret Sharing, but these require more technical expertise and careful operational security to use safely.
What happens if one of my Shamir share holders loses their share?
This is exactly what the threshold scheme protects against. In a 3-of-5 configuration, you can lose up to 2 shares and still recover your seed phrase with the remaining 3. This resilience is one of the primary advantages of Shamir Backup over single-seed backups, where losing the one copy means losing everything. That said, if you learn that a share has been lost, you should regenerate your entire Shamir setup with a new seed and new shares to restore your full redundancy.
Is Shamir Backup better than multisig for Bitcoin inheritance?
Both are valid approaches, but they solve the problem differently. Shamir Backup splits a single seed phrase into shares and requires your heirs to reconstruct it — they then have a standard wallet they can use normally. Multisig requires multiple independent keys to sign each transaction, which means your heirs need to maintain and operate multiple signing devices. For non-technical heirs, Shamir Backup is generally simpler to execute. For large holdings or institutional setups, multisig may provide stronger on-chain security guarantees since the threshold is enforced by the Bitcoin protocol itself.
Do I need a lawyer to set up Bitcoin inheritance planning?
While the technical setup of Shamir Backup does not require a lawyer, the broader estate planning context benefits from legal counsel. In Canada, Bitcoin is treated as property subject to capital gains tax on deemed disposition at death. A lawyer can help ensure your will properly references your digital assets, and an accountant familiar with Bitcoin can help minimize the estate’s tax burden. The technical and legal components should work together — Shamir secures the keys, while your legal documents provide the roadmap for your heirs.
How often should I review and update my Bitcoin inheritance plan?
Review your plan at least annually. Check that all share holders are still alive, reachable, and trustworthy. Verify that storage locations remain secure and that your instruction document reflects your current wallet setup and holdings. Major life events — marriage, divorce, birth of children, death of a share holder, significant changes in Bitcoin holdings — should trigger an immediate review. The plan is only as good as its current accuracy.
What should I do about my mining equipment in my inheritance plan?
Your mining hardware and operation should be documented separately from your Bitcoin key management. Include details about what equipment you run, where it is located, the electricity costs and contracts, pool account credentials, and whether the operation should be continued or shut down. If you have a hosting arrangement, include the hosting provider’s contact information and account details. Designate someone with enough technical knowledge to either maintain the operation or wind it down properly. Companies like D-Central Technologies can provide consulting support to your heirs if needed.




