HomeTagsMultisig

Multisig

What Is Multisig?

Why multisig is the best approach for long-term cold storage for most people, and how to make the most of it for your generational wealth.

Singlesig vs. Multisig: Bitcoin Self-custody Approaches Compared

A deep-dive into 7 ways people try to improve their singlesig bitcoin security, and why multisig is a better alternative for long-term savings.

MuSig2 Is Ready Pending Two New BIPs: Introducing A New Era Of Multisig Privacy

The final standards are being fleshed out to enable Schnorr based multisig across wallets and devices. After 3 years of hard work, things are almost ready to start talking about implementation.

Onramp, BitGo Unveil Bitcoin Custody Solution to Tap Trillions in Institutional Capital

Onramp launches a multi-institution BTC custody solution in collaboration with BitGo, aiming to facilitate and foster institutional adoption of bitcoin.

Nunchuk’s Collaborative Bitcoin Custody Platform Enters Beta

Nunchuk unveils Byzantine, a game-changing custody platform for Bitcoin advisors, highlighting multi-user wallets, enhanced security, and privacy.

Onramp Bitcoin Launches First Multi-Sig Spot Bitcoin Trust

The trust will utilize three separate key holders to offer the benefits of multisignature custody to institutional investors.

Why Multisig Is Essential For Anyone Who Believes In Bitcoin

Anyone holding a non-trivial amount of bitcoin should consider multisignature security, including how to mitigate potential attacks.

Trusted Third Parties Continue To Be Security Holes

The recent FTX collapse has demonstrated the shortfalls of third parties. Successful businesses in the future will incorporate multisig into their operations.

The Importance Of Testing Your Bitcoin Custody Setup

If you want to ensure you will be able to recover your Bitcoin in the event of an issue with your custodial setup, there’s only one way to do so!

Multisignature For The Nontechnical Bitcoiner

Using a managed multisignature solution is a way for the less technical Bitcoin users to protect themselves from centralized, third-party security holes.
- Advertisment -

LATEST ARTICLES