6 Modules. 33 Lessons.
Complete Bitcoin Security.

From foundational Bitcoin knowledge to advanced multisig vaults, privacy strategies, and inheritance planning. Everything you need to take full control of your Bitcoin — for good.

6
Modules
33
Lessons
24
Exercises
Lifetime Access
Module 1

Bitcoin Basics Free

What exactly is Bitcoin, and why does it represent a fundamental shift in how human beings store and transfer value? Build a solid mental model of how the Bitcoin network operates before touching any software or hardware.

What you'll learn
  • Explain what Bitcoin is and how it differs from traditional financial systems
  • Describe the role of the blockchain and why it is immutable
  • Define wallets, private keys, public keys, and Bitcoin addresses
  • Understand what a transaction is and how it gets confirmed
  • Read a basic block explorer and interpret transaction data
  • Understand UTXOs (Unspent Transaction Outputs) and why they matter for security
Lesson 1.1
What Is Bitcoin?
An introduction to Bitcoin as a decentralised, peer-to-peer electronic cash system. Covers the origin and context of Bitcoin's creation, Satoshi Nakamoto's whitepaper, and the core problem Bitcoin solves: trusting a third party to hold your money.
History of money Satoshi Nakamoto Trustless systems Bitcoin vs. banks
Lesson 1.2
How the Blockchain Works
A plain-English walkthrough of how blocks are chained together and why this structure makes Bitcoin transactions virtually impossible to reverse or tamper with.
Block structure Proof of Work Longest chain Confirmations
Lesson 1.3
Wallets, Keys, and Addresses
Demystifying the terminology. A 'wallet' does not hold coins — it holds keys. Understand the difference between private keys, public keys, addresses, seed phrases, and HD wallets.
Private keys Public keys Seed phrases HD wallets
Lesson 1.4
Transactions and UTXOs
How value actually moves on the Bitcoin network, and why understanding UTXOs is critical for both security and privacy.
Transaction anatomy Change addresses Fee dynamics Block explorers
Lesson 1.5
Bitcoin's Fixed Supply
Why 21 million is not arbitrary: the economic design of Bitcoin's issuance schedule, the halving, and why scarcity is a feature, not a bug.
21 million cap Halving schedule Digital scarcity
Get Module 1 Free →
Module 2

Why Bitcoin Over Crypto

The cryptocurrency landscape is crowded and confusing. This module cuts through the noise with a clear-eyed analysis of what makes Bitcoin categorically different from every other digital asset.

What you'll learn
  • Articulate the specific properties that make Bitcoin uniquely sound money
  • Understand why Bitcoin's decentralisation cannot be replicated by altcoins
  • Explain the custodial and regulatory risks of crypto exchanges and tokens
  • Identify common altcoin narratives and why they fail under scrutiny
  • Understand Bitcoin's network effect and why it compounds over time
Lesson 2.1
The Properties of Sound Money
What makes money 'good'? Examine the classical properties — scarcity, durability, divisibility, portability, fungibility — and evaluate how Bitcoin scores against gold, fiat, and altcoins.
ScarcityDurabilityDivisibilityFungibility
Lesson 2.2
Why Decentralisation Is Rare
Bitcoin's decentralisation is the result of a specific historical accident — Satoshi's anonymity and disappearance — that cannot be replicated. Why all other cryptocurrencies have identifiable founders or controlling entities.
DecentralisationThe Satoshi factorPre-mines & ICOsSecurities law
Lesson 2.3
Altcoin Narratives Examined
A critical analysis of the most common arguments for altcoins — 'faster transactions', 'smart contracts', 'Ethereum is more useful' — and why these arguments miss Bitcoin's fundamental value proposition.
Speed vs. finalitySmart contractsProof of StakeLightning Network
Lesson 2.4
The Network Effect and Schelling Point
Why Bitcoin's first-mover advantage is compounding and not easily displaced. The concept of a Schelling point and why Bitcoin fills that role for global, neutral money.
Metcalfe's LawSchelling pointLiquidity
Lesson 2.5
Custodial Risk and Exchange Risk
The history of exchange collapses (Mt. Gox, FTX, Celsius) and why holding crypto on exchanges is fundamentally different from holding Bitcoin in self-custody.
Not your keysExchange insolvencyFTX case studyRehypothecation
Buy Module 2 — $29 →
Learn more about this module
Module 3

Running a Full Node

Running your own full node is the most powerful step toward genuine Bitcoin sovereignty. A full node allows you to verify every transaction and every block yourself, without trusting anyone else.

What you'll learn
  • Explain what a full node does and why it matters for sovereignty
  • Select appropriate hardware for running a reliable node
  • Install and configure Bitcoin Core on a home machine or dedicated device
  • Connect a hardware wallet to your own node for private transaction broadcasting
  • Understand the difference between a pruned node and a full archival node
  • Grasp the basics of the Lightning Network and how a node participates
Lesson 3.1
What Is a Full Node and Why Run One?
A full node downloads and independently verifies every block in Bitcoin's history. It is the only way to be certain your Bitcoin is real — without trusting a third party, an app, or a company.
ValidationSPV vs. full nodes21M enforcementNode distribution
Lesson 3.2
Hardware Selection
You don't need an expensive machine. Realistic hardware requirements and popular purpose-built node options including Raspberry Pi, Umbrel, Start9, and dedicated PCs.
Raspberry PiUmbrelStart9SSD requirements
Lesson 3.3
Installing Bitcoin Core
Step-by-step walkthrough of downloading, verifying, and installing Bitcoin Core — the reference implementation of Bitcoin — including how to verify the software's authenticity before running it.
GPG verificationSHA256 hashInitial Block Downloadbitcoin.conf
Lesson 3.4
Connecting Your Wallet to Your Node
Connect your hardware wallet to your own node so your transaction data never goes to a third-party server. Protects both your privacy and your verification integrity.
Sparrow WalletLocal RPCTor connectionElectrum Server
Lesson 3.5
Lightning Network Overview
An introduction to the Lightning Network — Bitcoin's layer 2 payment protocol — for fast, low-cost Bitcoin payments without giving up sovereignty.
Payment channelsLND / CLNChannel managementCustodial vs. non-custodial
Buy Module 3 — $29 →
Learn more about this module
Module 4

Cold Storage Setup

The practical core of the course. Move from theory to hands-on action: setting up hardware wallets, generating and backing up seed phrases, and building multi-signature vaults that protect against theft, loss, and single points of failure.

What you'll learn
  • Distinguish between hot wallets, cold wallets, and multisig vaults
  • Set up and initialise a hardware wallet from scratch with a verified seed
  • Create a secure, redundant backup of a seed phrase including steel plate options
  • Understand multisig (2-of-3, 3-of-5) and when to use each configuration
  • Build a 2-of-3 multisig vault using Sparrow Wallet
  • Test a full recovery simulation before trusting any setup
Lesson 4.1
Hot vs. Cold Storage
Not all wallets are created equal. The spectrum from fully custodial (exchange) to fully sovereign (air-gapped multisig) — and how to choose the right tool for different amounts and use cases.
Exchange accountsHot walletsCold walletsAir-gapped multisig
Lesson 4.2
Hardware Wallet Setup
Hands-on walkthrough of setting up the most popular hardware wallets: Coldcard, Ledger, Trezor, and Keystone. Device verification, seed generation, PIN setup, and first use.
ColdcardLedgerTrezorSupply chain verification
Lesson 4.3
Seed Phrase Security and Backup
Your seed phrase is your Bitcoin. Losing it means losing access forever. Every method of backing up a seed — from paper to steel — and the pros and cons of each.
Paper backupSteel platesShamir's Secret SharingGeographic distribution
Lesson 4.4
Multisig Vaults Explained
Multisig requires M keys from N total keys to authorise a transaction. It is the gold standard for serious Bitcoin security because it eliminates every single point of failure.
2-of-3 setup3-of-5 setupKey distributionPSBT workflow
Lesson 4.5
Building a 2-of-3 Multisig Vault in Sparrow Wallet
A complete practical walkthrough of creating a 2-of-3 multisig vault using three hardware wallets and Sparrow Wallet as the coordinator. Create, receive, sign, and broadcast.
Sparrow WalletWallet descriptorPSBT signingNode broadcasting
Lesson 4.6
Recovery Testing
The most important lesson in the module: you must test your backup before you trust it. Simulate a full recovery on a fresh device using only your seed phrase and wallet descriptor.
Device loss simulationDescriptor recoverySigning verificationEmergency instructions
Buy Module 4 — $29 →
Learn more about this module
Module 5

Privacy Strategies

Bitcoin is pseudonymous — not anonymous. Every transaction is permanently recorded on a public ledger. Without deliberate privacy practices, your entire financial history can be reconstructed by anyone with the right tools.

What you'll learn
  • Understand how blockchain analysis firms trace Bitcoin transactions
  • Apply UTXO management and coin control to prevent unintended address linking
  • Use CoinJoin to break transaction graph history
  • Acquire Bitcoin with minimal or no KYC exposure where legal and appropriate
  • Route Bitcoin traffic through Tor to hide your IP address from the network
  • Evaluate the privacy tradeoffs of Lightning Network payments
Lesson 5.1
Bitcoin's Transparency Problem
The Bitcoin blockchain is a permanent public record. Exactly what is visible, to whom, and under what circumstances — including how chain analysis firms cluster addresses.
Chain analysisAddress clusteringUTXO graphCommon input heuristic
Lesson 5.2
Coin Control and UTXO Management
One of the most powerful — and most overlooked — privacy tools: choosing exactly which UTXOs you spend to prevent different coins from being merged and linked.
Coin controlUTXO labellingMerge avoidanceSparrow walkthrough
Lesson 5.3
CoinJoin
CoinJoin combines multiple users' UTXOs into a single transaction with equal-value outputs, making it impossible to determine which output belongs to which input. The most effective on-chain privacy tool available.
Equal-output modelWasabi WalletJoinMarketPost-mix discipline
Lesson 5.4
KYC-Free Bitcoin Acquisition
Bitcoin purchased from a KYC exchange is permanently linked to your identity. Strategies for acquiring Bitcoin with reduced identity exposure, within the law.
BisqPeach BitcoinBitcoin ATMsMining
Lesson 5.5
Tor, VPNs, and Network Privacy
Every time your wallet connects to the Bitcoin network, your IP address can be logged. How to route Bitcoin traffic through Tor to prevent network-level surveillance.
Tor configurationHidden servicesVPN comparisonIP protection
Lesson 5.6
Lightning Network Privacy
The Lightning Network offers some privacy advantages over on-chain transactions but also introduces new considerations. Both sides covered.
Payment privacyRouting metadataCustodial risksPhoenix & Breez
Buy Module 5 — $29 →
Learn more about this module
Module 6

Long-Term Security Strategy

The final module ties everything together and looks beyond setup. Long-term Bitcoin security means planning for scenarios you hope never happen: your death, a $5 wrench attack, a house fire, or your own memory failing you.

What you'll learn
  • Build a personal threat model that identifies your real risks
  • Create an actionable inheritance plan that heirs can execute without a technical background
  • Apply OPSEC principles to avoid advertising your Bitcoin holdings
  • Evaluate when your current security setup needs an upgrade
  • Identify the most common mistakes that lead to permanent Bitcoin loss
  • Develop a security review schedule and maintenance checklist
Lesson 6.1
Threat Modelling
Security is not one-size-fits-all. Who might want your Bitcoin, how might they try to get it, and what is your realistic exposure? Calibrate your setup to your actual threat landscape.
TheftLossCoercion$5 wrench attack
Lesson 6.2
OPSEC: Operational Security
The biggest security risk is often the person holding the Bitcoin. OPSEC is about not making yourself a target by inadvertently revealing that you hold significant value.
Social mediaSeparate identityDuress walletsLegal structures
Lesson 6.3
Inheritance Planning
If you were hit by a bus tomorrow, could your family access your Bitcoin? A practical inheritance plan that works even for non-technical heirs.
Inheritance letterKey holder strategyTime-locked transactionsWills & trusts
Lesson 6.4
Key Distribution and Geographic Redundancy
In a multisig setup, the physical locations of your keys matter enormously. How to distribute keys across locations to protect against fire, flood, theft, and family emergencies.
Geographic distributionSafe deposit boxesTrusted relativesInternational keys
Lesson 6.5
When to Upgrade Your Security Setup
Your security setup from day one may not be appropriate when your holdings grow or your circumstances change. Clear thresholds and triggers for upgrading.
Under $10K$10K–$100KOver $100KLife event triggers
Lesson 6.6
Common Mistakes That Cause Permanent Loss
More Bitcoin is lost through user error than stolen by hackers. The most common mistakes catalogued so you can consciously avoid every one.
Digital seed storageSingle backupLost descriptorFirmware updates
Lesson 6.7
Your Security Maintenance Checklist
Security is not a one-time event. The ongoing habits and periodic reviews that keep a Bitcoin security setup healthy over years and decades.
Monthly reviewQuarterly backup checkAnnual recovery testLife event audit
Buy Module 6 — $29 →
Learn more about this module

Module 1 is completely free.

Five lessons. One hour of reading. Everything you need to understand how Bitcoin actually works — and why most people's coins are one mistake away from being gone forever.

Get Module 1 Free →