Observed Custody Patterns

Reference of patterns in how Bitcoin custody setups behave under stress.

This page is a reference, not guidance. It describes patterns commonly observed when Bitcoin custody setups are subjected to stress. The patterns are not based on your specific results and do not recommend actions, changes, or decisions.

This page is often referenced to understand why a modeled result may appear the way it does, or to recognize patterns that recur across different stress scenarios. You do not need to read it all at once.


I. System-Level Patterns

These patterns describe overall properties of custody setups and often explain why a system is modeled to behave consistently across many different stress scenarios.

Timing of Custody Access (Liquidity Timing)

What Is Observed

Custody systems differ in when access becomes possible during disruption. Some allow immediate execution; others involve waiting, coordination, or external processes.

Under Stress

Independence of Access Paths

What Is Observed

Many systems appear to have multiple recovery paths, but those paths often rely on the same underlying elements: one person, one account, or one institution.

Under Stress

Independence is often assumed based on appearance rather than structure.

Sensitivity to Delay

What Is Observed

Custody systems vary in how access behavior changes as time passes. Some remain stable; others become more fragile over time.

Under Stress


II. Scenario-Based Patterns

These patterns tend to appear when specific stressful conditions disrupt normal assumptions.

Time-Based Degradation

What Is Observed

Some systems rely on elements that change over time, even when no disruptive event occurs: passwords, subscriptions, institutional policies.

Under Stress

Reliance on Memory

What Is Observed

Many systems depend on information that someone is expected to remember. That information may not be fully written down or may lack context.

Under Stress

Sensitivity to Device Loss

What Is Observed

Some systems assume continued access to specific devices or locations.

Under Stress

Owner Death or Absence

What Is Observed

Many systems rely on the original owner to explain what exists, initiate custody access, or resolve ambiguity.

Under Stress

Physical Coercion

What Is Observed

Some systems allow immediate access without delay.

Under Stress

Legal or Institutional Restriction

What Is Observed

Legal action can block normal access paths without enabling custody access.

Under Stress

Forced Relocation

What Is Observed

Some systems assume access will occur from a specific location or country.

Under Stress


III. Common Failure-Type Patterns

These patterns describe how systems are commonly observed to fail once custody access is attempted.

Authority and Role Confusion

What Is Observed

Roles and permissions are not always clearly defined or documented.

Under Stress

Shared Dependencies

What Is Observed

Different recovery paths rely on the same tools, accounts, or services.

Under Stress

Human Process Dependence

What Is Observed

Some systems rely on people following specific steps correctly.

Under Stress

Third-Party Dependence

What Is Observed

Some systems rely on outside services or institutions.

Under Stress

Information Availability

What Is Observed

Critical custody access information is assumed to be discoverable.

Under Stress


IV. Pattern Overlap

Most real custody setups show multiple patterns at the same time. Common overlaps include delay combined with missing information, shared dependencies combined with human coordination, and legal authority combined with lack of access.


These patterns describe how custody setups are commonly observed to behave under stress. They are descriptive only and do not imply instructions, recommendations, or required changes.

← Return to Methodology

For anyone who holds Bitcoin — on an exchange, in a wallet, through a service, or in self-custody — and wants to know what happens to it if something happens to them.

Start Bitcoin Custody Stress Test

$179 · 12-month access · Unlimited assessments

A structured, scenario-based diagnostic that produces reference documents for your spouse, executor, or attorney — no accounts connected, no keys shared.

Sample what the assessment produces
Original text
Rate this translation
Your feedback will be used to help improve Google Translate