§ Course · Intermediate1 day (7 + 1 h break)
Bitcoin Security.
Securing Bitcoin in practice: entropy, transaction privacy, multisig patterns, hardware wallets, and adversarial thinking.
§ 01Who it’s for
Designed for these rooms.
A
Individuals with meaningful Bitcoin holdings
B
Family offices and high-net-worth custody teams
C
Businesses that handle Bitcoin operationally
§ 02Outcomes
Concrete outcomes, not vibes.
- 01Design a custody setup that matches your actual threat model
- 02Generate entropy and back up seeds in a genuinely recoverable way
- 03Use multisig patterns appropriately — not just theatrically
- 04Think adversarially: social engineering, supply chain, coercion
§ 03Curriculum
5 modules. 7 hours + 1h break.
M01
Threat modelling
What are you actually defending against? Realistic scenarios, realistic priorities.
M02
Entropy and keys
How seeds are made, how they fail, how to verify yours is safe.
M03
Hardware wallets in practice
What they solve, what they don't, how to use them right.
M04
Multisig patterns
2-of-3, 3-of-5, inheritance schemes, geographic distribution.
M05
Operational security
Privacy on-chain, privacy off-chain, social engineering resistance.
“Every course is adapted to the room.You tell me what your team already knows, where they struggle, and what decisions are ahead — and the content shifts to match.”