Skip to main content

The Pro-Rata Rule and Backdoor Roth Conversions

 For tax purposes, the IRS considers all your (seemingly separate) IRAs as one big account. The pro-rata rule boils down to the percentage of your total combined IRA balances that has yet to be taxed. Whatever that percentage is determines the percentage of your backdoor Roth IRA conversion that will be taxed.

For example, let’s say you have $94,000 in existing traditional IRAs that were funded with pre-tax dollars. And now you contribute $6,000 to a new traditional IRA with after-tax dollars, then immediately convert that $6,000 to a Roth via the backdoor Roth IRA strategy.

As far as the IRS is concerned, you now have $100,000 in traditional IRAs, and the $6,000 you are contributing with after-tax dollars represents 6% of your total. That means only $360 of your $6,000 backdoor conversion is tax-free (6% of $6,000). You owe income tax on the other $5,640 you backdoored.

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...