Bitvault
Bitvault
Bitvault
Designed the UI/UX for a next-gen Bitcoin wallet focused on real-world security, protecting users not just from digital hacks but even physical coercion.
Designed the UI/UX for a next-gen Bitcoin wallet focused on real-world security, protecting users not just from digital hacks but even physical coercion.




Introduction
Introduction
Bitcoin holders face a paradox: The same decentralization that makes cryptocurrency valuable also makes users uniquely vulnerable. While the industry obsesses over preventing digital hacks, a more visceral threat lurks in plain sight - physical coercion. The "$5 wrench attack" isn't theoretical. It's happening. And most Bitcoin wallets are defenceless against it. Dr. Francesco Madonna approached me with a challenge that would redefine mobile cryptocurrency security: Design a Bitcoin wallet that protects users even when attackers have them at gunpoint.
Bitcoin holders face a paradox: The same decentralization that makes cryptocurrency valuable also makes users uniquely vulnerable. While the industry obsesses over preventing digital hacks, a more visceral threat lurks in plain sight - physical coercion. The "$5 wrench attack" isn't theoretical. It's happening. And most Bitcoin wallets are defenceless against it. Dr. Francesco Madonna approached me with a challenge that would redefine mobile cryptocurrency security: Design a Bitcoin wallet that protects users even when attackers have them at gunpoint.












Context and problem space
Context and problem space
The paradox of self-custody
Bitcoin's promise is financial sovereignty. But that promise has a dark side: when you are your own bank, you're also your own security team. And unlike digital threats, physical coercion can't be solved with better encryption.
Bitcoin's promise is financial sovereignty. But that promise has a dark side: when you are your own bank, you're also your own security team. And unlike digital threats, physical coercion can't be solved with better encryption.
The real-world threat landscape:
Between 2024-2025, physical attacks on cryptocurrency holders increased by 27% (Chainalysis Security Report, 2025). High-profile cases:
Between 2024-2025, physical attacks on cryptocurrency holders increased by 27% (Chainalysis Security Report, 2025). High-profile cases:
Oslo, Norway (June 2024): Armed robbery netted $3.2M in Bitcoin after forcing victim to unlock phone and approve transfers
Oslo, Norway (June 2024): Armed robbery netted $3.2M in Bitcoin after forcing victim to unlock phone and approve transfers
São Paulo, Brazil (September 2024): "Virtual kidnapping" ring held families hostage via video call while forcing Bitcoin transfers
São Paulo, Brazil (September 2024): "Virtual kidnapping" ring held families hostage via video call while forcing Bitcoin transfers
Miami, Florida (January 2025): Home invasion targeted known Bitcoin investor, threatened family members
Miami, Florida (January 2025): Home invasion targeted known Bitcoin investor, threatened family members
The pattern was clear: attackers had evolved faster than wallet security. They weren't trying to crack cryptography, they were exploiting the human holding the keys.
The pattern was clear: attackers had evolved faster than wallet security. They weren't trying to crack cryptography, they were exploiting the human holding the keys.






Research and discovery
Research and discovery
Competitive intelligence
I conducted systematic heuristic evaluations of the market leaders: Ledger, Trezor, and Electrum, mapping their architectures against real-world threat models.
I conducted systematic heuristic evaluations of the market leaders: Ledger, Trezor, and Electrum, mapping their architectures against real-world threat models.
The discovery
Every competitor optimized for ease of use or security, never both. Hardware wallets prioritized protection but demanded technical fluency. Software wallets were accessible but vulnerable to physical compromise.
Every competitor optimized for ease of use or security, never both. Hardware wallets prioritized protection but demanded technical fluency. Software wallets were accessible but vulnerable to physical compromise.
SWOT analysis
SWOT analysis
Strengths:
Time-delay architecture (industry-first for mobile).
Time-delay architecture (industry-first for mobile).
Multi-device verification without technical overhead.
Multi-device verification without technical overhead.
Physical attack mitigation built into core UX.
Physical attack mitigation built into core UX.
Weakness:
No existing mental models to leverage.
No existing mental models to leverage.
Unproven concept requiring user education.
Unproven concept requiring user education.
Longer initial setup versus single-key wallets.
Longer initial setup versus single-key wallets.
Opportunities:
First-mover advantage in physical security space.
First-mover advantage in physical security space.
Growing market of high-net-worth holders seeking protection.
Growing market of high-net-worth holders seeking protection.
Longer initial setup versus single-key wallets.
Longer initial setup versus single-key wallets.
Threats:
User reluctance to adopt unfamiliar patterns.
User reluctance to adopt unfamiliar patterns.
Potential for setup errors compromising security.
Potential for setup errors compromising security.












The human factor
The human factor
Through interviews with 23 Bitcoin holders, from casual investors managing $5K to seasoned holders with seven-figure portfolios, a devastating pattern emerged:
Through interviews with 23 Bitcoin holders, from casual investors managing $5K to seasoned holders with seven-figure portfolios, a devastating pattern emerged:
78%
78%
of users had never considered physical attack vectors
64%
64%
would abandon self-custody if attacks became prevalent in their region
91%
91%
wanted protection but feared setup complexity would cause mistakes
0%
0%
users had experience with time-delayed transactions



Design process
Design process
The design process began with a simple truth, security shouldn’t feel complicated. I started by identifying the key psychological friction points users face when interacting with multisig wallets: uncertainty, setup anxiety, and fear of making irreversible mistakes. Every design decision that followed was guided by the goal of reducing these emotions and replacing them with confidence and clarity.
I adopted design philosophy crystallized around three pillars:
The design process began with a simple truth, security shouldn’t feel complicated. I started by identifying the key psychological friction points users face when interacting with multisig wallets: uncertainty, setup anxiety, and fear of making irreversible mistakes. Every design decision that followed was guided by the goal of reducing these emotions and replacing them with confidence and clarity.
I adopted design philosophy crystallized around three pillars:
1.
Invisibility through obviousness
Security features should feel like natural extensions of sending Bitcoin, not technical add-ons requiring PhD-level understanding.
2.
Psychological scaffolding
Every high-stakes action (device pairing, transaction delays) needed visual reassurance that builds confidence rather than anxiety.
3.
Error-proof by design
The system should make dangerous mistakes impossible, not just warn against them.
Wireframes and sketching
Early wireframes focused on:
Early wireframes focused on:
No existing mental models to leverage.
No existing mental models to leverage.
Step-by-step guidance without jargon
Step-by-step guidance without jargon
Visual reassurance at critical decision points
Visual reassurance at critical decision points
Iterative testing helped refine copy, hierarchy, and flow before moving into high-fidelity design.
Iterative testing helped refine copy, hierarchy, and flow before moving into high-fidelity design.



Final design execution
Final design execution
Onboarding flow
The onboarding guides users through setting up three devices, each representing a unique key. The QR-based scanning process turns what could be intimidating cryptography into a simple “connect-the-dots” experience.
The onboarding guides users through setting up three devices, each representing a unique key. The QR-based scanning process turns what could be intimidating cryptography into a simple “connect-the-dots” experience.






Time-Delay Security
Users can select a delay window (from 2 hours to 15 days). If an attacker forces a transaction, users gain precious time to cancel from a different device before funds move. This feature, though invisible in most wallets, is presented in BitVault as a natural part of sending Bitcoin.
Users can select a delay window (from 2 hours to 15 days). If an attacker forces a transaction, users gain precious time to cancel from a different device before funds move. This feature, though invisible in most wallets, is presented in BitVault as a natural part of sending Bitcoin.









Home Dashboard – Visibility that builds trust
The home dashboard was designed to feel like a personal command center, calm, structured, and reassuring. At a glance, users can see their live balance, and any delayed transactions in progress. Pending transactions are displayed with countdown timers, subtly communicating transparency and control. This layout helped users see both their wealth and their safety at once.
The home dashboard was designed to feel like a personal command center, calm, structured, and reassuring. At a glance, users can see their live balance, and any delayed transactions in progress. Pending transactions are displayed with countdown timers, subtly communicating transparency and control. This layout helped users see both their wealth and their safety at once.






Impact & Results
Impact & Results
Within six weeks of beta launch, and after usability testing and iteration:
Within six weeks of beta launch, and after usability testing and iteration:
Onboarding success increased from 54% → 91%
Onboarding success increased from 54% → 91%
Average setup time reduced by 42%
Average setup time reduced by 42%
0 failed transactions recorded during beta testing
0 failed transactions recorded during beta testing
89% of users reported feeling confident or very confident using Bitvault in high-risk scenarios
89% of users reported feeling confident or very confident using Bitvault in high-risk scenarios
These results validated a core belief:
security only works if people can actually use it.
These results validated a core belief:
security only works if people can actually use it.
The bigger picture
The bigger picture
Bitvault represents a shift in how we think about cryptocurrency security, from purely cryptographic protection to holistic, real-world defense. The project proved that advanced security doesn't require advanced users. With thoughtful design, fortress-grade protection can feel as natural as locking your front door. As Bitcoin adoption grows beyond early adopters, physical security will become table stakes. Bitvault is building that table.
Bitvault represents a shift in how we think about cryptocurrency security, from purely cryptographic protection to holistic, real-world defense. The project proved that advanced security doesn't require advanced users. With thoughtful design, fortress-grade protection can feel as natural as locking your front door. As Bitcoin adoption grows beyond early adopters, physical security will become table stakes. Bitvault is building that table.
Client's testimonial
Client's testimonial

Dr. Francesco Mardonna
Founder & CEO, Bitvault
"He was a lot precise and responsive in the UI/UX development of Bitvault. His skills are outstanding and his delivery was timely. I strongly recommend to anyone to work with Samuel"
"He was a lot precise and responsive in the UI/UX development of Bitvault. His skills are outstanding and his delivery was timely. I strongly recommend to anyone to work with Samuel"
Want to reach out?
Want to reach out?
Want to reach out?