Best self-custody UX. Mobile key management. Inheritance protocol.
You hold all keys. Recovery requires planning. Physical exposure risk.