The Age of Keys: How to Run Your Life on Cryptographic Identity

 

Made2Master Systems · Security

The Age of Keys: How to Run Your Life on Cryptographic Identity

Passwords die; keys rule. Passkeys/WebAuthn, hardware tokens, and selective-disclosure credentials make identity portable and private. For money, key literacy = sovereignty (Bitcoin custody). Identity is the new computer science for everyone.

🧠 AI Processing Reality...
AI Key Takeaways
  • Passkeys/WebAuthn are a W3C standard (Rec: 2019; L2 Rec: 2021) that remove passwords with phishing-resistant public-key login.
  • FIDO2 + CTAP2 let you use roaming hardware keys (USB/NFC/BLE) across devices and accounts.
  • DID v1.0 (W3C Rec: 2022) & Verifiable Credentials v2.0 (W3C Rec: 2025) enable selective-disclosure identity you control.
  • Recovery isn’t optional: design before deploy — test restores, split custody, and lawful dead-man switches.
  • Bitcoin keys: learn single-sig → multisig; know who can spend, how they recover, and when heirs inherit.
/security/keys · executive-summary

1) Executive Summary

In 2025, key literacy has become a baseline skill for anyone serious about digital sovereignty. Passwords are collapsing under the weight of phishing, credential reuse, and brute-force automation. What replaces them is not just one technology, but a discipline of key management spanning daily logins, hardware tokens, identity wallets, and financial custody.

This guide frames keys as the new operating system for life. Whether you are logging into Shopify, authenticating to your bank, holding a verifiable credential, or securing Bitcoin, the primitives are the same: generate entropy, keep private keys private, validate signatures, and plan for recovery. The difficulty is not conceptual but operational — knowing what to do when devices break, people forget, or organisations change.

🔑 Why Keys Matter

  • Identity = Keys: You are defined by what you can cryptographically sign, not by what server remembers.
  • Money = Keys: In Bitcoin and other digital bearer assets, whoever holds the private key controls the funds.
  • Access = Keys: Role-based access in teams, organisations, and cloud services is implemented through key policies.

🚀 Strategic Outcomes

By mastering this system, you will be able to:

  1. Use passkeys/WebAuthn for daily accounts, eliminating phishing vectors.
  2. Deploy hardware keys for high-value assets with roaming capability, geo-redundancy, and PIN discipline.
  3. Adopt SSI wallets to hold and present verifiable credentials with selective disclosure.
  4. Design recovery playbooks that balance resilience with privacy — avoiding single custodians.
  5. Practice Bitcoin custody patterns, from single-sig hygiene to multisig and inheritance.
  6. Run team/organisation identity OS with role-based keys, break-glass procedures, and quarterly audits.

📅 The 21-Day Literacy Sprint

Execution is structured as a 21-day sprint. Each day has a concrete assignment: generating test keys, registering a passkey, enrolling a hardware authenticator, backing up a seed, verifying recovery, and simulating loss. By the end, you will have rehearsed the entire lifecycle of key management.

🧩 Design Principles

  • Practice recovery before you need it. A plan not tested is not a plan.
  • Separate knowledge: one person may know the plan, but not the keys.
  • Layer controls: device + roaming hardware + SSI + multisig ensures no single point of failure.
  • Document lawfully: recovery instructions must comply with local laws and not bypass controls.

⚡ What This Means for Builders

Builders, entrepreneurs, and families alike need to embed key literacy into daily practice. In the same way that literacy and numeracy were once societal thresholds, cryptographic literacy is now the gateway to sovereignty. This guide exists not just to explain standards, but to provide executional templates, checklists, and drills that make identity and money survivable under stress.

Bottom line: Keys are no longer optional. They are your passport, your wallet, your vault, and your signature — all at once. Master them, and you master your digital life.

/security/keys · keys-101-threat-modelling

2) Keys 101 & Threat Modelling

Before adopting advanced identity systems, you must understand the primitives. Keys are not magic. They are long numbers, generated with enough entropy to make guessing impossible, and paired as public/private.

🔐 Public vs Private Keys

  • Private key — a secret number. Whoever controls it can sign or spend.
  • Public key — mathematically derived from the private key; safe to share; used to verify signatures.
  • Address/identifier — often a shorter hash or representation of the public key, used for accounts, wallets, or DID endpoints.

Security flows from keeping the private key secret while freely distributing the public key for validation. Lose the private key and you lose control. Leak it and anyone can impersonate you.

🎲 Entropy: The Source of Strength

Good keys are born from randomness. Standards such as BIP-39 define how a random number is converted into a mnemonic seed phrase (e.g., 12 or 24 words). This seed can deterministically generate millions of keys via BIP-32 hierarchical derivation.

  • Entropy quality matters: use audited libraries or hardware wallets, not custom scripts.
  • Seed phrases must be stored offline; anyone who sees them has full control.
  • Backups should be tested, not just written.

🛡 Threat Modelling for Humans

Threat modelling is simply answering: who are you defending against, and what resources do they have? For most people, the critical risks are not nation-states but loss, theft, phishing, and coercion.

  • Loss — device breaks, account locked out, paper backup destroyed.
  • Theft — attacker steals phone, hardware key, or seed backup.
  • Phishing — tricked into entering credentials in a fake site; mitigated by passkeys/WebAuthn.
  • Coercion — someone forces you to hand over credentials; mitigated by multisig, time-locks, or legal structures.

🧩 Minimal Personal Threat Model

Every individual should maintain a one-page threat model:

  1. Assets: what am I protecting? (accounts, Bitcoin, identity credentials)
  2. Adversaries: who could realistically attack me? (hackers, insiders, opportunists)
  3. Attack surface: where are the weak points? (email resets, paper backups, cloud sync)
  4. Controls: what mitigations are in place? (hardware keys, offline backup, multisig)

⚡ Operational Discipline

  • Write once, verify twice: every backup must be tested with a restore.
  • Keep secrets separate: never store a seed phrase with the device that uses it.
  • Review annually: threat models change — new devices, new risks, new laws.

Remember: Complexity is the enemy of security. Start with a clear model of threats and scale controls only as your risk grows.

/security/keys · passkeys-daily-accounts

3) Passkeys for Daily Accounts

The first frontier of key literacy is passkeys. A passkey replaces a password with a public/private key pair bound to your identity. Instead of typing something attackers can steal, you simply prove possession of a key.

🌐 Standards and Adoption

Passkeys are built on the W3C WebAuthn standard and the FIDO2 protocol. Major platforms — Apple, Google, Microsoft — now natively support passkeys. Shopify, PayPal, and most banks are rapidly integrating them.

  • Platform authenticators: keys bound to a device (e.g., iPhone Face ID, Android biometric, Windows Hello).
  • Roaming authenticators: physical hardware (USB/NFC/BLE keys) you carry and use across devices.

🔑 Why Passkeys Beat Passwords

  • Phishing-resistant: no secret typed, nothing to steal or reuse.
  • Strong cryptography: 256-bit key pairs, unguessable, unique per service.
  • User-friendly: biometric or PIN unlock; sync across devices with iCloud Keychain, Google Password Manager, etc.

⚙️ Setup & Migration

  1. Enable passkeys on accounts that support them (start with email, cloud storage, finance).
  2. Register at least two authenticators: one platform (e.g., phone) and one roaming hardware key.
  3. Disable SMS or email 2FA fallback once confident — these are weak links.
  4. Document your recovery path (what happens if you lose your phone?).

📲 Real-World Examples

Apple: When you create a passkey, it syncs via iCloud Keychain. Logging in on another device triggers Face ID/Touch ID.
Google: Passkeys are stored in your Google Account and can be used across Chrome/Android ecosystem.
Shopify: Merchants and staff accounts can enroll passkeys to reduce phishing risk in store admin access.

🛠 Recovery and Redundancy

Passkeys remove the "forgot password" flow, which means you must plan recovery differently:

  • Multiple devices: enroll phone + laptop.
  • Hardware backup: register a roaming key kept in a safe place.
  • Family account recovery: Apple and Google allow designated contacts to restore account access.

⚡ Operational Guidelines

  • Keep at least one passkey offline-capable (roaming key not tied to cloud sync).
  • Rotate and test: remove stale authenticators; confirm backups every 6 months.
  • Train yourself: rehearse login from a new device with no stored sessions.

Bottom line: Passkeys are the easiest entry point into the world of key-based identity. They solve phishing today and prepare you for SSI tomorrow. Master them now, and passwords will soon feel as archaic as dial-up internet.

/security/keys · hardware-keys-playbook

4) Hardware Keys Playbook

Hardware security keys are the roaming authenticators that underpin serious account and asset protection. They implement FIDO2 / CTAP2 standards and often double as PGP, SSH, or Bitcoin signing devices. Unlike platform-bound passkeys, hardware keys can be carried, cloned, and geo-distributed for redundancy.

🔑 Core Functions

  • Authentication: login to services via USB, NFC, or BLE.
  • Cryptographic signing: confirm sensitive transactions or deployments.
  • Second factor: complement passkeys, or act as recovery path.

🛠 Setup Checklist

  1. Buy at least two keys from trusted vendors (YubiKey, SoloKeys, Nitrokey).
  2. Initialize each key with a strong PIN policy (8+ digits, never default).
  3. Enroll keys on all critical accounts (email, bank, cloud, Shopify admin).
  4. Label and record each key’s role in your operational runbook.

🔒 PIN & Unlock Policies

Hardware keys often enforce retry counters. Exceeding limits will brick the device. Best practice is to:

  • Set PINs long enough to resist guessing but memorable without writing.
  • Test the unlock flow regularly to avoid forgotten PINs.
  • Store reset/recovery instructions in a separate secure location.

📦 Clones & Redundancy

The key lesson: one key is none. You must plan for loss and theft:

  • Primary key: daily driver, kept on your keychain.
  • Backup key: kept in a safe or vault, enrolled on the same accounts.
  • Geo-distributed key: stored with trusted family or in another physical location.

🌍 Storage Geography

Spread risk across geography. A fire, theft, or border seizure should not wipe you out.

  • Keep at least one backup key in a different building (e.g., bank box, family safe).
  • For organisations: place keys in different offices or regions.
  • Document storage locations in your confidential inventory.

🚨 Break-Glass Procedures

“Break-glass” refers to emergency access when normal flows fail. Every operator should have:

  • Emergency backup key sealed in a tamper-evident bag, only opened in crisis.
  • Runbook that explains when and who is authorized to use it.
  • Audit trail for when break-glass is invoked.

🛫 Travel & Border Protocols

Hardware keys can trigger scrutiny at airports or borders. To reduce risk:

  • Carry a minimal travel key that holds no sensitive material.
  • Leave primary custody keys at home or secure vaults.
  • Consider “decoy accounts” with low privileges if forced to log in under coercion.

⚡ Operational Discipline

  • Rotate hardware keys every 3–5 years, or after vendor security advisories.
  • Maintain an inventory spreadsheet (device IDs, purpose, location, last tested).
  • Run a quarterly drill: simulate key loss and verify backup restores.

Bottom line: Hardware keys are your physical anchors in a digital world. Treat them like house keys: you need spares, you need distribution, and you need a plan for emergencies.

/security/keys · ssi-verifiable-credentials

5) SSI & Verifiable Credentials (Practical Use)

Self-Sovereign Identity (SSI) is the layer that makes keys into portable identity. Instead of accounts tied to corporate servers, you carry decentralized identifiers (DIDs) and verifiable credentials (VCs) in your own wallet. This lets you prove facts about yourself without leaking every detail.

🪪 Core Standards

  • DID v1.0 — W3C Recommendation (2022): a global standard for decentralized identifiers.
  • VC Data Model v2.0 — W3C Recommendation (2025): how credentials are issued, presented, and verified.
  • Selective disclosure: only reveal the piece of information required (e.g., “over 18” rather than full date of birth).

📱 SSI Wallets

An SSI wallet is an app (mobile or desktop) that stores your DIDs and credentials. Examples: Trinsic, Dock, Lissi, Microsoft Entra Verified ID. They function like a password manager, but instead of secrets, they hold cryptographic proofs.

  • Issuing: a university issues you a diploma credential.
  • Holding: you store it in your wallet, encrypted by your keys.
  • Presenting: you share a proof with an employer, who verifies it against the issuer’s public key.

🔑 Selective Disclosure in Practice

Imagine entering a bar. Instead of showing your entire driver’s licence, you prove only: “Over 18: Yes”. This is done by creating a zero-knowledge proof from your credential. The verifier trusts the signature, not the photo or address.

🚦 Revocation & Expiry

  • Revocation lists: issuers can mark credentials invalid if compromised.
  • Expiry dates: most VCs include end-dates, requiring reissuance.
  • Wallet hygiene: delete expired or revoked credentials to avoid clutter and leaks.

🛠 SSI Pilot Playbook

  1. Download a reputable SSI wallet and back up its seed phrase securely.
  2. Enroll at least one DID method (e.g., did:key, did:web, did:ion).
  3. Obtain a test credential (many issuers provide demo ones).
  4. Practice presenting the credential to a verifier service.
  5. Document recovery — what happens if you lose the wallet device?

🌍 Organisational Adoption

Companies can issue VCs for employee access, training, or compliance. Instead of usernames/passwords, staff carry credentials signed by the org. Benefits:

  • Instant revocation when an employee leaves.
  • Portable proofs for contractors and vendors.
  • Reduced liability: no need to store personal data centrally.

⚡ Operational Guidelines

  • Keep wallet seed backups offline, like you would for Bitcoin.
  • Test revocation: issue a credential, revoke it, and verify denial of service.
  • Stay updated: SSI standards evolve quickly — track W3C and DIF activity.

Bottom line: SSI lets you own your identity the same way Bitcoin lets you own your money. With DIDs and VCs, you decide what to share, when to share it, and who can verify it — all without centralised intermediaries.

/security/keys · recovery-backups

6) Recovery & Backups (People · Places · Processes)

The difference between professionals and casualties in key management is recovery. Everyone generates keys; only disciplined operators rehearse recovery. A system is only as strong as its weakest restore path.

📝 The Recovery Trilemma

Recovery must balance three competing goals:

  • Availability — can you restore when devices fail?
  • Confidentiality — are secrets safe if backups are exposed?
  • Integrity — do restores yield the same working keys?

📂 Backup Mediums

  • Paper — simple, offline, but vulnerable to fire/water.
  • Steel plates — resistant to fire and flood; industry standard for Bitcoin seed backups.
  • Encrypted digital backups — password-protected files, ideally with offline storage.
  • Secret sharing — split secrets using Shamir’s Secret Sharing or multisig scripts.

🧑‍🤝‍🧑 People in the Loop

For recovery, you may need trusted humans. This introduces both resilience and risk.

  • Social recovery: designate 3–5 trusted guardians who can collectively restore access (used in some Ethereum wallets).
  • Lawyer or trustee: for inheritance or regulated contexts.
  • Family members: viable, but must be educated and trustworthy.

🌍 Places & Geography

  • Keep backups in separate buildings — avoid fire/flood single points of failure.
  • Geo-distribute across regions or countries for high-value systems.
  • Track exact storage locations in a confidential runbook.

⚙️ Processes

  • Test restores: verify every backup by restoring to a clean device.
  • Versioning: rotate keys and update backups — archive old versions securely.
  • Audit: quarterly check that backups still exist, are legible, and accessible.

🔄 Shamir vs Multisig

  • Shamir’s Secret Sharing: split one secret into N shares, require M to reconstruct. Good for humans, but fragile if shares are lost.
  • Multisig: multiple independent keys required to sign. Better for Bitcoin custody and org accounts — each signer holds a complete key.

⏱ Dead-Man Switches (Lawful)

A dead-man switch releases access if you fail to check in. This is powerful for inheritance but dangerous if misused.

  • Use lawful services or trusted executors — not DIY scripts that could leak secrets.
  • Document in wills/trusts how and when recovery occurs.
  • Encrypt instructions separately from actual keys.

⚡ Operational Guidelines

  • At least two different media for backups (e.g., steel + encrypted file).
  • At least two locations (home + bank box).
  • At least two people briefed on recovery plan (without full secrets).

Bottom line: You don’t own a key until you’ve restored it. Treat recovery as a drill, not a theory. Secrets live and die not in generation, but in restoration.

/bitcoin/custody · patterns-educational

7) Bitcoin Custody Patterns (Educational)

Keys are not just for identity — they are money itself in Bitcoin. Whoever controls the private key controls the coins. Custody design is therefore an existential question: how do you hold, spend, and inherit digital bearer assets safely?

🔑 Single-Signature Hygiene

A single-sig wallet is one key controlling one address. It is the simplest pattern, but also the most fragile. Best practices:

  • Use hardware wallets (e.g., Coldcard, Trezor, Ledger) — never hot wallets for savings.
  • Secure the BIP-39 seed phrase offline, ideally in steel backup form.
  • Maintain redundant backups in separate locations.
  • Do not reuse addresses; use HD derivation for privacy and hygiene.

🔐 Multisignature Topologies

Multisig requires M-of-N keys to spend. This greatly reduces single points of failure. Example: 2-of-3, 3-of-5. Benefits include theft resistance, distributed trust, and resilience against device loss.

  • Geographic split: keys stored in different locations or jurisdictions.
  • Organisational split: different team members or departments hold keys.
  • Family split: each heir holds a key, requiring majority to spend.

📜 Spending Policies

Custody is not just about holding; it’s about rules for spending.

  • Daily driver: small balance hot wallet for spending.
  • Cold savings: large balance hardware or multisig wallet, air-gapped.
  • Policy controls: define who authorises, how transactions are reviewed, and when alerts are triggered.

🏛 Inheritance Basics

Bitcoin must be planned for inheritance — otherwise, coins die with the owner. Strategies include:

  • Multisig with heirs: heirs already hold keys, can spend with executor approval.
  • Instructional package: sealed will with seed recovery details (lawful, encrypted).
  • Dead-man switch: lawful services that release instructions if owner is inactive.

⚠️ Common Pitfalls

  • Storing seed phrases in cloud or photos.
  • Relying on custodial exchanges as “savings.”
  • Setting up multisig but never testing recovery.
  • Failing to document inheritance, leaving heirs stranded.

⚡ Operational Guidelines

  • Always test spend from any custody setup before trusting large balances.
  • Document a runbook: how to restore, who to call, what to check.
  • Rehearse inheritance handover with trusted parties (lawful + secure).
  • Balance security vs accessibility: too complex = unusable, too simple = unsafe.

Bottom line: Bitcoin is the ultimate key-based asset. Custody is not solved by buying hardware — it is solved by designing human processes that survive failure, theft, and death.

/security/keys · team-org-identity-os

8) Team / Org Identity OS

Keys don’t just protect individuals — they govern organisations. A lost laptop or disgruntled employee can become an existential threat if role-based identity is not properly enforced. A Team / Org Identity OS turns abstract crypto into daily operational control.

👥 Role-Based Access Control (RBAC)

Each role should map to a key, not to a password. Examples:

  • Admin: multisig or hardware key with highest privileges.
  • Manager: scoped access, able to approve but not unilaterally execute sensitive changes.
  • Operator: limited keys for daily tasks; no escalation ability.
  • Auditor: read-only keys for monitoring and reporting.

🔄 Provisioning & Deprovisioning

Accounts tied to individuals must be issued and revoked by process, not by ad hoc emails.

  • Onboarding: issue hardware keys during orientation, document PINs and policies.
  • Role change: rotate credentials and update multisig rosters immediately.
  • Offboarding: revoke access within hours, not days — rehearse this like a fire drill.

🚨 Break-Glass Accounts

Every organisation needs an emergency access path if admins are unavailable.

  • Keep sealed hardware keys in tamper-evident bags, accessible only by board or trustees.
  • Document conditions for use: e.g., “if two admins are unreachable for 72h.”
  • Maintain audit logs whenever break-glass accounts are activated.

📊 Audit & Monitoring

Trust is not a control — logs are. An Identity OS requires continuous visibility.

  • Maintain access logs for all critical systems.
  • Run quarterly key audits: confirm all keys still exist and are in authorised hands.
  • Require dual approval for sensitive changes (e.g., DNS, treasury).

⚖️ Compliance & Legal Considerations

  • Document key policies in governance handbooks.
  • Align with standards such as NIST 800-63B for authentication.
  • Ensure GDPR/PII compliance by minimising centralised identity storage.

⚡ Operational Guidelines

  • Keep a key inventory: list of holders, device IDs, roles, last verification date.
  • Enforce least privilege: operators never hold admin keys.
  • Run tabletop exercises: simulate insider attack, admin loss, or rogue actor.

Bottom line: In organisations, identity is infrastructure. Treat keys as part of the supply chain: issued, monitored, rotated, and revoked with precision. A Team Identity OS is not optional — it is the backbone of resilience.

/security/keys · templates-checklists

9) Templates & Checklists

Execution requires tools, not theory. These templates and checklists turn abstract principles into daily discipline. They can be copied, adapted, and embedded into team handbooks or personal runbooks.

📋 Passkey Rollout Checklist

  • [ ] Identify all services that support passkeys (email, banking, Shopify, GitHub).
  • [ ] Register at least one platform passkey and one roaming hardware key.
  • [ ] Disable SMS/email fallback once passkeys are tested.
  • [ ] Document recovery contacts and flows.
  • [ ] Review every 6 months and rotate stale authenticators.

🔑 Hardware Key Kit (Bill of Materials)

  • [ ] 2× Primary hardware keys (daily + backup).
  • [ ] 1× Geo-distributed backup key (different building/region).
  • [ ] Fire/water resistant storage (steel safe or safety deposit box).
  • [ ] Tamper-evident bags for break-glass kits.
  • [ ] Runbook page mapping each key ID → role.

🪪 SSI Pilot Worksheet

  • [ ] Download and set up SSI wallet (record seed backup location).
  • [ ] Create at least one DID method (did:key / did:web / did:ion).
  • [ ] Obtain demo credential (e.g., test diploma or membership card).
  • [ ] Present credential to a verifier service successfully.
  • [ ] Test revocation workflow — issuer revokes, verifier rejects.

🛡 Recovery Drill Script

  1. Simulate loss: pretend a phone or hardware wallet is destroyed.
  2. Restore from backup (paper/steel/encrypted file).
  3. Verify restored keys by signing or spending a small transaction.
  4. Log time taken and obstacles encountered.
  5. Update documentation with lessons learned.

₿ Custody & Inheritance Checklist

  • [ ] Define balances: hot wallet (daily), warm wallet (short-term), cold/multisig (savings).
  • [ ] Document spend policies: who authorises, thresholds, alerts.
  • [ ] Record backup locations (2 media × 2 locations minimum).
  • [ ] Draft lawful inheritance instructions (executor, heirs, conditions).
  • [ ] Rehearse inheritance handover at least once with trusted parties.

⚡ Annual Key Audit Template

Key ID Role Holder Location Last Tested Status
YK-1 Admin Alice Office Vault 2025-06-01
YK-2 Backup Bob Bank Box 2025-05-15
HW-3 Operator Charlie On-Person 2025-08-28 ⚠️ PIN reset due

⚖️ Quick Rules

  • 2×2×2 Rule: two media × two locations × two people briefed.
  • No untested backups: if it hasn’t been restored, it doesn’t exist.
  • Write + Verify: document policies, then prove they work in drills.

Bottom line: Checklists turn chaos into process. The best time to discover a missing key is during a drill, not during a crisis.

/security/keys · 21-day-key-literacy-sprint

10) Execution Framework — 21-Day Key Literacy Sprint

Knowledge without practice fades. The 21-Day Key Literacy Sprint is a tactical program to embed key skills into muscle memory. Each day has a concrete, verifiable task. By the end, you will have rehearsed every lifecycle: generation, usage, backup, recovery, and escalation.

📅 Structure

The sprint is broken into three phases:

  • Week 1 — Fundamentals: generating, understanding, and enrolling keys.
  • Week 2 — Systems: backups, hardware, SSI, and recovery drills.
  • Week 3 — Integration: Bitcoin custody, team ops, and inheritance planning.

🗓 Daily Assignments

Day Assignment Verification
Day 1 Generate a test keypair (PGP or Bitcoin). Confirm you can sign & verify a message.
Day 2 Write down a 12-word seed phrase (BIP-39). Restore it on a second device (offline).
Day 3 Register a passkey on a daily account. Login with Face ID/Touch ID; no password.
Day 4 Enroll a hardware key on two services. Confirm login works with primary + backup.
Day 5 Enable PIN policy on hardware key. Test unlock and failed-attempt counter.
Day 6 Draft a personal threat model (1 page). Identify assets, adversaries, and attack surface.
Day 7 Test login recovery path (lost device scenario). Simulate login from a new device with backup.
Day 8 Create an offline paper or steel backup. Photograph location (encrypted) or log coordinates.
Day 9 Split a secret with Shamir’s Secret Sharing. Recombine M-of-N shares successfully.
Day 10 Install an SSI wallet and register a DID. View DID in wallet and export public key.
Day 11 Obtain a test verifiable credential. Present selective disclosure proof to verifier.
Day 12 Revoke a credential (issuer demo). Verify it fails in verifier check.
Day 13 Run a recovery drill: pretend phone lost. Restore from backup and login within 30 min.
Day 14 Document a lawful dead-man switch plan. Write executor instructions (no secrets exposed).
Day 15 Set up a Bitcoin hardware wallet. Receive and send a test transaction.
Day 16 Test multisig wallet (2-of-3). Sign with two keys; confirm third is redundant.
Day 17 Define custody tiers (hot, warm, cold). Document balances and spending rules.
Day 18 Assign roles in a “team identity OS.” Create a table of admins, operators, auditors.
Day 19 Run a tabletop exercise (insider attack). Document how team revokes compromised keys.
Day 20 Draft inheritance handover plan. Write lawful will/trust addendum referencing keys.
Day 21 Full simulation: disaster recovery. Recover from scratch (backup → spend → verify).

🏆 Milestones

  • Milestone 1 (Day 7): All daily accounts secured with passkeys + backup key enrolled.
  • Milestone 2 (Day 14): SSI wallet live, recovery tested, dead-man switch documented.
  • Milestone 3 (Day 21): End-to-end recovery drill successful (identity + Bitcoin).

⚡ Operational Guidelines

  • Each assignment must be checked off and logged (journal, spreadsheet, or Notion).
  • Pair sprint with a daily reminder — do not skip days; habits form with rhythm.
  • Adapt complexity to risk: families may only need single-sig + passkeys; businesses must push to multisig + SSI.

Bottom line: In 21 days, you can go from “password dependent” to key-literate. The sprint is not just education — it is transformation. Your new default: every login, every credential, every coin — signed, tested, recoverable.

Original Author: Festus Joe Addai — Founder of Made2MasterAI™ | Original Creator of AI Execution Systems™. This blog is part of the Made2MasterAI™ Execution Stack.

❓ Frequently Asked Questions

What is a passkey?

A passkey is a public/private key pair that replaces a password. It uses the WebAuthn standard to provide phishing-resistant login tied to your device or hardware authenticator.

How are hardware keys different from passkeys?

Passkeys are often bound to your device ecosystem (e.g., iCloud, Google), while hardware keys are portable physical devices (USB/NFC/BLE) you can use across accounts and platforms.

What happens if I lose my keys?

If you have tested backups (paper, steel, or digital) and a recovery plan, you can restore access. Without backups, loss usually means permanent loss of access.

What is Self-Sovereign Identity (SSI)?

SSI lets you hold verifiable credentials (e.g., diplomas, licences) in your own wallet, proving facts about yourself without relying on centralised databases or sharing excess personal data.

How does Bitcoin custody fit into key literacy?

Bitcoin is pure key-based money. Learning key literacy ensures you can safely store, spend, and inherit coins without relying on custodians or exchanges.

What is the 21-Day Key Literacy Sprint?

It’s a structured program of daily exercises (generating, backing up, restoring, and using keys) designed to make cryptographic identity second nature within three weeks.

Back to blog

Leave a comment

Please note, comments need to be approved before they are published.