Frequently Asked Questions

  1. If the Beneficiary Key is lost, what do I do?
  2. If either key is lost, the seed phrase CANNOT be decrypted. This is the risk of self custody. Unless there are other means of retrieval, the Bitcoin is gone. Legacy does not save any data.

  3. Can I create multiple two-part passwords?
  4. Yes. You can create as many Benefactor/Beneficiary key combinations as you like, each associated with a different seed phrase.

  5. How do I use the Legacy software offline?
  6. Download "Legacy-offline.html" from github. Disconnect from wifi. Open the file in a web browser.

  7. Are there any restrictions on allowable characters for the keys?
  8. No. Beneficiary Key and Benefactor Key may contain all uppercase, lowercase, numbers, and special characters.

  9. What information needs to be included in the Deadman Switch Email?
  10. The Beneficiary needs to receive:

    1. Benefactor Key

    2. Encrypted Seed Phrase

    3. Working copy of "Legacy-offline.html"

    See Deadman Switch options for setup guidance.

  11. What makes a good key?
  12. The best keys are 4–5 random, unrelated words separated by spaces — for example, cloud mango river tuesday. This approach gives you high entropy while remaining memorable enough to carry in your head or communicate verbally to your Beneficiary. You should never need to write both keys down together or store them with the encrypted QR.

    Legacy uses PBKDF2 with 600,000 iterations of SHA-256, which makes even a modest passphrase extremely resistant to brute force. The dual-key design means an attacker who obtains one key still cannot decrypt anything — they need both.

    Keep the Benefactor Key and Beneficiary Key stored separately. Never store either key alongside the encrypted QR.

  13. Key dos and don'ts — with examples
  14. ✓ Good keys — random, unrelated words with no personal connection:

    • cloud mango river tuesday
    • lamp orbit forest eleven quiet
    • thunder anchor velvet parade
    • seven bridge harbor silk moon
    • arctic bench window plum escape

    ✗ Bad keys — guessable by anyone who knows you, or by anyone in the Bitcoin space:

    • bitcoin — single obvious word
    • satoshi2009 — predictable Bitcoin reference
    • john1985 — name + birth year, trivially guessable
    • password123 — among the most common passwords in existence
    • iloveyou — common and emotionally predictable for an inheritance tool

    Note: the examples above are illustrations only — do not use them. Choose your own words at random.

  15. Tips for scanning QR codes on SeedSigner
  16. For best results when scanning an encrypted QR:

    • Printed QR codes scan most reliably — printing eliminates screen glare, pixel grid artifacts, and double-digitization blur. If you can, print the encrypted QR and store it with your estate documents.
    • Laptop or desktop screen is the next best option — larger display means larger QR modules and better contrast.
    • Phone screen: set brightness to maximum and display the QR full-screen (not as a thumbnail). Hold the phone steady, parallel to the SeedSigner camera, at roughly 10–15 cm distance.
    • Back button: during active scanning, hold the back button for 1–2 seconds — it only registers between decode attempts.
  17. How exactly does the encryption protocol work?
  18. Visit the Protocol page for detail summary.