This is a pretty interesting indeed:
Quick summary courtesy of hark.now
B-SSL_WP_Oct_11_2025.pdf
_5 minutes_
Bitcoin offers perfect ownership, yet also perfect loss – a reality that discourages individuals from truly holding their own coins. The goal is to enable a model where users maintain independent control while benefiting from a cryptographically guaranteed recovery path, without introducing custodial trust or requiring protocol modifications. This is achieved through B-SSL, a trust-minimized vault structure built using existing Bitcoin consensus features.
B-SSL leverages Taproot and Miniscript to commit multiple, independent spending paths within a single vault output. Each path incorporates its own key set and time-delay, creating a hierarchical security model. This structure provides a fast, configurable path for normal operation, a one-year fallback path ensuring continued sovereignty, and a three-year custodian path designed for unforeseen circumstances like disappearance or inheritance.
The key structure is central to this design. A primary key, ‘A’, is held by the user, with a copy ‘A₁’ stored separately. A secondary key, ‘B’, is held by a custodian, alongside its copy ‘B₁’. A co-signer key, ‘C’, is utilized in both the configurable and long-delay paths. An optional convenience service, ‘CS’, can act as a gatekeeper, enforcing time-delays and emitting secret notifications – and may be self-hosted or custodian-hosted. All spending conditions are verified and enforced directly on-chain, ensuring a robust and recoverable self-custody solution.
Spending is facilitated through three distinct paths, each designed with specific security and recovery properties. The primary operational path utilizes a configurable delay, ranging from two hours to fifteen days (relative CSV), activated upon user initiation. Keys A or A₁ combined with C govern this path, with an optional Convenience Service (CS) enforcing the delay and providing secret notifications to designated monitoring wallets. Should the CS be unavailable, users retain full control via fallback mechanisms.
A crucial element is the User Fallback Path, secured with keys A and B and employing a one-year absolute CLTV. This ensures sovereign recovery capability irrespective of external service disruptions. Complementing this is the Custodian Recovery Path, utilizing keys B or B₁ alongside C, and a three-year CLTV. This path is specifically constructed to prevent custodian collusion; funds are inaccessible for three years post-inactivity, guaranteeing consensus-level security against premature movement.
These paths are expressed through a Taproot/Miniscript policy, where each leaf remains independent – revealing one does not compromise the others. All delays are enforced directly by Bitcoin nodes through standard primitives like CHECKLOCKTIMEVERIFY and CHECKSEQUENCEVERIFY, ensuring consensus-enforced timing. Beyond timing, the system provides resistance to both physical and cyber attacks through cryptographic delays and optional notifications, offering users critical reaction time. The CS itself operates as an off-chain layer, never possessing custodial power or private keys. Ultimately, the design prioritizes permanent recoverability and operates entirely within current Bitcoin rules, requiring no new opcodes.
Its role is to release co-signature approval only after a configured delay, with the option to broadcast notifications of pending transactions. Custodial solutions present varying degrees of independence and security. A self-hosted configuration offers maximum privacy and control, relying on the user’s own infrastructure with minimal third-party dependence. Alternatively, a custodian-hosted configuration adds social and physical attack resistance through regulated external verification, though it offers less deterrence against physical coercion. Importantly, both approaches maintain full on-chain enforceability of the defined delays.
To further mitigate risk, a secret notification mechanism can be implemented. When a transaction is initiated via the delay path, an encrypted notification is emitted to pre-defined guardian wallets or monitoring endpoints, providing actionable warning time before transaction finality and significantly reducing vulnerability to both physical and cyber attacks.
Operational guidelines are critical; vault rotation should occur approximately every 2.5 years to avoid accidental custodian recovery path activation. Descriptors and public keys must be stored securely offline, and all paths thoroughly validated on regtest before mainnet deployment. Device compatibility with Taproot script-path signing and periodic verification of notification endpoints are also essential.
Ultimately, this transforms Bitcoin custody into a demonstrably loss-resistant and attack-resilient process, replacing reliance on memory or trust with deterministic, verifiable spending policies secured by Bitcoin’s consensus rules. The introduction of human-safe time delays and recovery options makes long-term self-custody feasible for a wider range of users, institutions, and future generations. This paper is released for peer review and invites critique from developers, cryptographers, and security researchers.