pull down to refresh
Some other useful resources for references.
10x Security Bitcoin Guide10x Security Bitcoin Guide
How to store bitcoin without any single point of failure.
https://btcguide.github.io
Border walletsBorder wallets
Wallets RecoveryWallets Recovery
What kind of tools would you use for step 5?
"Avoid having SPOF, unilateral control over your main savings; Create spatial, temporal, social friction"
I think this has more to do with your personal protocol than with tooling. Everyone has differing circumstances and skills. (Spatial/Temporal) Find a way that forces you to travel in order to construct a transaction. Words or Hardware are in multiple geographic locations. (Social) Find a trusted friend or relative or lawyer or third party key custodian to validate your safety and intentions before signing. Make certain all this is documented. Practice.
Don't use yeti cold lol
6 - how do they incentivize violence?
Duress passwords are a known tactic. If an attacker thinks you use them, they have the incentive to beat them out of you. You'll find real world examples of this in Jameson Lopp's Known Physical Bitcoin Attacks Best to not have unilateral control of your funds and be ready to prove this to your attacker.
A few things to consider: