Product

Plan B Vault — Policy‑Driven Bitcoin Vaulting

Design your custody like a product: multisig, time‑locks, spending policies, approvals, and tested recovery — built for teams and long‑term holdings.

Self‑custody Multisig & time‑locks Approvals & audits
Request a Demo See features

Features

Policy engine

Define spend limits, approval thresholds, time windows, and guardians.

Multisig vaults

Descriptor‑based multisig with flexible quorum (e.g., 2‑of‑3, 3‑of‑5).

Time‑locks

Add delays to high‑risk spends and enable inheritance after a timelock.

Key ceremonies

Structured setup with checklists, shard distribution, and location plans.

Recovery drills

Periodic restore tests with documented steps and sign‑off.

Watch‑only & proofs

Watch‑only wallets for finance and proof‑of‑funds/signing workflows.

How it works

Design policy

Define quorum, roles, limits, and time‑locks with stakeholders.

Provision keys

Generate and verify keys on approved devices; plan storage locations.

Create vault

Deploy descriptors, addresses, and watch‑only views for finance.

Operate & audit

Initiate spends, collect approvals, and keep audit‑ready logs.

Common use cases

Treasury vault

Long‑term holdings with strict policies and delayed withdrawals.

Team custody

Shared governance for small teams with role‑based approvals.

Inheritance plan

Designate beneficiaries with time‑locked recovery paths and documentation.

Security & operations

No custodial control of client funds; keys remain with you across devices.
Least‑privilege roles for initiators, approvers, and auditors; comprehensive logs.
Geographic redundancy and storage guidance for key material and backups.

Integrations

Hardware wallets

Compatible with common, standards‑based signing devices and PSBT flows.

Back‑office

Watch‑only for finance; exports and webhooks for reconciliation.

Nodes & explorers

Connect to your node for address derivation and transaction broadcasting.

FAQ

Do you hold any keys?

No. Plan B Vault is designed for self‑custody; you control the keys.

What happens if a key is lost?

Quorum design and recovery drills ensure continuity; we document recovery paths.

Can we restrict spending by time or amount?

Yes — policies can require delays, multi‑approvals, and per‑day limits.

Does it support inheritance?

Yes — designate beneficiaries and enable time‑locked access with governance steps.

Is it multisig only?

We prioritize multisig for teams; single‑sig flows are available for smaller cases.

How do we get started?

Request a demo; we’ll define policies, run the key ceremony, and set up your vault.

Make your Bitcoin un‑mess‑with‑able

We’ll help you design policies, run key ceremonies, and test recovery — end to end.

Request a Demo