Virtual inheritance through paper transmission
What happens on the internet stays on the internet. Cybersecurity requires offline paper armor, contractual weaponry defending an intangible asset.

Today is certain to be a day to be remembered. The morning of my 21st birthday. The day the last of my Father’s legacy is due to arrive. The first of it had arrived 5 years earlier to the day:
At 8AM on the morning of her 16th birthday the package arrived for Reign, short for Sovereign. Her Father, who’d died a year earlier, had said that she was destined to rule over her world and the name represented her self-rulership. His sea plane had disappeared on a flight between San Juan, Puerto Rico and Acapulco, Mexico, leaving him officially “lost at sea” just before her 15th birthday. He’d owned nothing and worked for himself, by himself, living out of an off grid 500 sq ft tiny home that was the extent of the legacy he had left her. For the last year, she’d been left feeling abandoned by him, as he’d disappeared from her life too soon, leaving her left to fend for herself in the world.
Her Father had taught her to live simply and frugally, relying only on oneself. Asking the world neither for permission or forgiveness. He taught her to always do her own research, be skeptical, but still listen and always independently verify everything and everyone. Private by default, he kept all information on a strict need to know basis and never over-shared about himself, his past, his future, and never his finances. A self-reliant solo-preneur, he’d boycotted the banking debt systems, never using banks or credit cards. He had always lived within his means, producing more than he consumed, and saved all he could. No one had ever known him to spend money when he didn’t have to. Getting him to spend anything was like pulling teeth, done painfully, with great complaint and discomfort.
Inside the certified mail letter, postmarked from a Wyoming Lawyer’s office, was only a hand-written note and a black notebook. Having hoped that somehow there’d been something of value, finding only a notebook left her sobbing with disappointment. Inside the notebook's cover she found a piece of paper, an SD card, and a small USB device with a button on it. Curiosity shortly won out over disappointment, and she opened the letter…
My beautiful Reign,
If you’re reading this letter it means that some “hit by a bus scenario” has played out and I’ve experienced an unforeseen death. I’ve arranged for a form of legacy “smart contract” to deliver this notebook to you if I’ve died unexpectedly. It has been time-locked until you’re 16th birthday and is now yours to build your future upon.
You are a capable young lady who can fend for herself IF given the resources to do so, even at this tender age. This will provide you a foundation for you to build your own research upon. When you turn 21 you can expect the last of my legacy for you to arrive in another notebook. This will help you avoid the temptation to sell our dynasty short, parting with it too soon before its had time to mature. An additional 5 years of holding these BTC will no doubt make a world of difference in its value and functionality. This is a young technology that needs time to evolve and for the world to realize what it is.
I truly believe that you’ll find in this black notebook all that you need to build a life that positively impacts the world. I’ve stored all the excess value I created over my life in an intangible form that cannot be taxed, seized, or stolen. It can be lost though! The data in this notebook is backed up only by the mini-SD card tucked inside the cover jacket.
This little black book gives you keys to a kingdom that no one knows is yours, that cannot be stolen by force, doesn’t require any paperwork on your part, and will almost certainly increase in purchasing power over time. The SD card also contains my user’s manual, a toolbox of hardware, software, platforms, and networks, and a slide deck training you on how to use them all safely. Links to those resources are also included in the notebook. As I've always reminded you, redundancy matters, i.e. “1 is none, 2 is one, and 3 is enough”.
I’ve built a strong, well-stocked vessel for you, but you must choose a few trusted crewmates. Choose wisely. Don’t waste time on those that hesitate to join you and remember that those closest to you are often your greatest security sinkholes. In the world we have been born into, “The Golden Rule” means that those with the “Gold” get to make the “Rules”. That is now changing as new crypto kingdoms arise. Citadels of freedom, with rules, but no rulers. Where code and mathematics are trusted, not our fellow men.
This Black Notebook provides you with all you need to lead our family and our peers into this new possibility. May you realize the potential that I’ve accumulated, but did not get to make real myself.
Know that I am always with you. May the lessons I’ve shared with you guide you safely throughout the journey of your life.
In crypto there are no take-backs. What’s done is done, the ledger is immutable, and mistakes will not be forgiven. Losing the data included in this notebook means these funds are irrevocably lost, as effectively as if you’d burned a $100 bill. Treat this notebook as the treasure it is. Keep it somewhere safe, and separate the mini-SD card, storing the only backup of data in a different, secure location. With both the storage places for this data always kept secret, protected from prying eyes, as well as flood and fire.
Inside, the notebook was broken down into three sections:
Mindsets, Toolsets, and Skillsets.
Listed inside were crypto-exchanges, wallets, & bank accounts. With access and recovery data for each one. Included was the Master Password for the Password Management account. There was the email addresses devices used for each of the various exchange accounts. Including the codes to recover each account's authentication key on the Google Authenticator 2FA App . Taped inside the notebook’s cover was a Yubikey, a physical USB authentication key that would make remote access of her devices near impossible.
Withdrawal from those exchange accounts was only possible to whitelisted wallet addresses and only then with an email verification first. Inside that black notebook were ALL the authenticators necessary for access to a virtual treasure. It was a paper treasure map to a virtual treasure. One immune to physical theft and only available to her, without anyone else's knowledge.
Skillsets
Managing transactions and protecting purchasing power at rest requires:
• Price discovery/transaction confirmation
• OpSec disciplines to minimize human-error
• Keeping arm’s-length separation avoiding co-mingling of personal and business funds
• Using VPNs, TOR, and anonymous accounts to obscure identifying data
• Volatility management and liquidity strategies between Fiats/Metals/Cryptos
Toolsets
Even virtual assets require physical tools
• Repurposed smart phones or purpose-built hardware wallets for private/public key management
• Physical Multi-factor authentication key/s preventing remote access of devices
• SD card and metal passphrase storage of mnemonic recovery phrases
Software and platform tools
• Master password manager like Last Pass
• Anti-Malware subscription
• Encrypted communications; by text, email, audio, and video
• Block explorers, portfolio managers, and liquidity solutions
Legacy contractual armor
• Wyoming LLCs/public banking operations
• Statutory Trusts/public asset holding
• Private Contract Trusts/private asset holding
• Private Membership agreements/team governance
Mindsets
It’s not only what you use and how you use them, but also how you direct the use of your tools that matters.
• 2 is 1, 1 is none
• Secrecy IS Security
• Don’t Trust, Verify
• Not you keys, not your coins
• There are 3 sides to every coin
• Encrypt as if everyone is listening
• ALL information is need to know
• Control risk through segregation and compartmentalization
After installing the Samourai Wallet App, plugging in the MFA key, using the Master Password and OTP she typed in the recovery passphrases granting her access to the intangible manifestation of her Father’s life’s work.
She'd spent the last year believing that her Father had left her nothing as a legacy. Abandoning her to carry forth into the future without any momentum to help build a life for her own family.
She couldn't believe her eyes when she read the current balance of the BTC in her phone was worth ~$20,000 USD. Her Father’s discipline, foresight, and economic understanding had let him create a foundation she would build their family dynasty upon!
Today is now 5 years to the day since that first memorable notebook arrived.
Just as Reign arrived at her destination at exactly 8 am, a group of three men approached the car. The leader of the group was a tall, fit, young man wearing glasses, a suit, and a ponytail. He stopped, bowed his head slightly, and held out his hand as Reign stepped out of the car.
Slightly taller than Reign’s 5’ 11”, at about 6’ 3”, his grip was strong, gentle, and fully present. “Hello, your Father had contracted with me to hold these assets in Trust for you. Today that contract expires, and I’m to release them to your care”.
He held out another black notebook just like the first one, along with a small briefcase. “I just need you to sign this document accepting custody of these items. This will transfer control of these assets to you, relinquishing my responsibility for them, and authenticating the chain of custody for them.”
Setting the briefcase on the trunk to use as a writing surface, she signed the transfer documents, handing them distractedly back to him. Quickly pulling out the note to read her Father’s last words:
Reign, my final gift to you is worth more than 1,000 Bitcoin stored on these wallets:
Someone you can Trust!
You can trust this young man, Jubal Harshaw, with your life. As I’ve entrusted him with my Life’s work, knowing that he’d keep it safe for you. I can’t predict the exact form they’ll take, but I do know what solutions are coming.
I’ve request Jubal curate crypto versions of a
• debit card,
• bearer instrument,
• camouflaged hardware wallet,
• pre-programmed privacy protecting retail friendly node.
With these tools, financial sovereignty shall be yours.
Rule well, my Daughter. My love is always with you.
She looked up smiling at Jubal through the tears in her eyes, paused but a moment, and asked “Have you ever hear of an Earthship?”. Closing the door to her Tesla, she grabbed Jubal by the hand, and lead him out of the airplane hanger towards her plane. Saying “A hurricane’s coming. Time to leave the Puerto Rico beach house and head to my Crypto Citadel.”
As he sat down next to her in the plane, she opened the briefcase to find only plastic card with the letters LN on it, what looked like a small calculator w/ColdCard inscribed on it, a small red box with a Samurai etched into the lid, and large Orange Pill shaped USB stick.
Grinning as she grabbed what looked like a phone but wasn’t, she told Jubal to pull up a BTC wallet address on his phone. When he did so, she scanned the QR code with her device.
A few minutes later the transaction cleared, she’d sent him a simple message as a Satoshi Test from her wallet. It said “Welcome to the Tribe!”.
He couldn’t believe his eyes when he saw the balance of the wallet she’d sent this message from: 10,000 BTC! His jaw dropped as he realized that what he’d considered an immense sum left to her by her Father, was merely 1/10th of what she held in this wallet alone.
As a new level of respect rose in him, young Jubal looked at the even younger pilot next him with fresh eyes. He realized he couldn’t dream of where she’d lead him to next, but he was looking forward to finding out where that would be.




Comments
There are no comments for this story
Be the first to respond and start the conversation.