DEFENDING BITCOIN

Resources

Personal Threat-Model Worksheet

Ten questions, one personal threat model. Your answers make specific threats applicable, and the tool pulls the book’s recommended controls from the threat graph. Everything runs locally.

Pick an answer below to start building your threat model

Ten questions to build a threat model for your Bitcoin. Every answer runs in your browser. Nothing is transmitted, nothing is stored outside this tab unless you choose to copy the URL. The output is a list of threats the book names that apply to your situation, and the controls the book recommends as defenses.

Q01Select any that apply

Which of these describe you?

Select every role that fits. Most readers pick one; some pick several.

Q02

Where is most of your Bitcoin right now?

The biggest single factor in your personal risk surface.

Q03

How significant is this holding to you?

Higher stakes raise the realistic threat level. Rough estimates are fine. Nothing here is transmitted.

Q04

Who knows you hold Bitcoin?

Visibility is the force multiplier on every Layer 1 threat. The fewer people know, the less often the threat materializes.

Q05Select any that apply

How did you acquire your Bitcoin?

Every acquisition channel leaves a different footprint. KYC exchanges link identity to UTXOs; P2P and mining rewards don't.

Q06

If you died tomorrow, could the right people recover your Bitcoin?

The book argues that a large share of historical Bitcoin loss comes from the holder dying with an untested plan.

Personal model so far

0threats0controls

Continue to broader context

Four more questions about the world your bitcoin lives in: jurisdiction, time horizon, whether you run a node, and your technical comfort. They surface political, infrastructure, and quantum-era threats. Stop here if you only wanted the personal model.

Read it early

Defending Bitcoin is in advance review now. Sign up for Defending Bitcoin updates and the BookFunnel link arrives in your confirmation email — read the manuscript before launch in exchange for an honest review.

Get an advance copy
0 / 10 answered

Awaiting answers

Your threat model appears here as you answer. Nothing computes until you pick something.