Shepley Capital

WALLETS & SECURITY

Wallets and Security - Cryptopedia by Shepley Capital

Seed Phrase Storage: Complete Guide

Your seed phrase is the most important piece of information you will ever generate in cryptocurrency. It is a 12 to 24 word sequence that serves as the master key to your entire crypto wallet: every account, every address, every coin stored on that wallet can be recovered from anywhere in the world using these words in the exact order given. This makes the seed phrase simultaneously the ultimate backup and the ultimate vulnerability. Anyone who obtains your seed phrase gains complete, immediate, and irreversible access to all funds associated with it.

 

The principle of self-custody depends entirely on seed phrase security. When you take your Bitcoin, Ethereum, or any other cryptocurrency off an exchange and into a wallet you control, the security of those funds reduces to one question: is your seed phrase secure? If yes, your funds are safer than on any exchange. If no, your funds are at risk from anyone who discovers those words regardless of whether they ever touch your device.

 

This guide covers every aspect of seed phrase storage: how seed phrases work technically, what materials to use for physical backup, where to store your backups, how to verify backups work, and the critical mistakes that have caused ordinary Australians to lose their entire crypto holdings permanently. The hardware wallet ultimate guide covers device security; this guide covers the seed phrase backup that hardware wallets and software wallets both depend on.

 

What a Seed Phrase Is and How It Works

A seed phrase (also called a recovery phrase, mnemonic phrase, or backup phrase) is a human-readable representation of your wallet’s master private key. The words come from a standardised list of 2,048 words defined by the BIP-39 standard. When your wallet generates a new seed phrase, it selects 12 or 24 words from this list in a specific order determined by a cryptographic random number generator, then derives a master private key from those words. Every private key in your wallet is mathematically derived from this single master key using deterministic derivation paths.

 

The security of this system comes from entropy: the number of possible 12-word combinations from 2,048 words is astronomically large (2^128 possibilities), making brute-force guessing effectively impossible with any foreseeable technology. A 24-word phrase provides 2^256 security, matching the entropy of a raw 256-bit private key. This means your seed phrase is cryptographically secure as long as it was generated by a trusted, properly functioning device and has not been exposed to anyone.

 

The same seed phrase can recover your wallet on any BIP-39 compatible device: hardware wallets like Ledger and Trezor, software wallets like MetaMask, Exodus, or Trust Wallet, and even command-line tools. This portability is a feature: it means you are never locked into one software provider or device. It is also why the security of your backup is paramount: a seed phrase on paper is as powerful as the device it came from.

 

Why Seed Phrase Storage Fails: Common Causes of Loss

Permanent cryptocurrency loss from seed phrase failures falls into predictable categories. Understanding these failure modes informs proper storage design.

 

Digital storage: The most common mistake is storing seed phrases digitally. A photo in your camera roll (synced to iCloud or Google Photos), a note in Apple Notes, a text file on your desktop, an email draft, a screenshot, a password manager entry — all of these expose your seed phrase to any attacker who compromises your device, your cloud account, or any service the data passes through. Crypto malware and keyloggers specifically target stored text files and password managers looking for seed phrases. Phishing attacks that gain access to cloud accounts find seed phrase notes as the highest-value target. Digital storage of a seed phrase undermines the entire security model of self-custody.

 

Single copy failure: A seed phrase written on a single piece of paper, stored in one location, is one house fire, flood, or theft away from permanent loss. The biggest crypto disasters include numerous cases of Australians losing significant holdings because their only backup was destroyed in a natural disaster or stolen in a home burglary. Geographic redundancy is not paranoia for significant holdings: it is minimum due diligence.

 

Poor physical storage: Paper stored in a drawer, unprotected from moisture, fire, and fading, is not adequate for long-term holding. Paper degrades over years. Ink from standard pens fades. House fires reach temperatures that destroy paper within minutes. Floods saturate and destroy written records. For crypto holdings measured in thousands or tens of thousands of AUD, paper in a drawer is inadequate physical security.

 

Sharing or exposure: Sharing your seed phrase with customer support (legitimate hardware wallet manufacturers and wallet providers will never ask for your seed phrase), entering it into a website prompted by an email, or typing it on a computer to “move” it to a new wallet are all vectors through which seed phrases are stolen. Recovery phrase scams specifically exploit users at the moment of wallet setup or perceived wallet problem, convincing them to enter their seed phrase into a fraudulent interface.

 

Physical Backup Materials: Paper vs Metal

The choice of backup material is one of the most important seed phrase storage decisions. The options exist on a spectrum of durability, cost, and convenience.

 

Paper: Writing seed phrases on paper with a permanent pen is the minimum viable approach. Use acid-free archival paper (standard printer paper degrades over decades), and write with a waterproof permanent ink pen (Sharpie markers or archival pens). Standard ballpoint pen ink fades and can smear if wet. Laminating paper provides modest water resistance but does not protect against fire. Paper backup is acceptable for smaller holdings or as a secondary redundant backup, but not as the sole backup for significant holdings.

 

Metal stamping: Stamping seed words into stainless steel or titanium plates using letter stamps is the gold standard for physical durability. Metal plates survive house fires (paper burns at 233°C; stainless steel melts above 1,400°C), floods (metal is waterproof), and physical damage that would destroy paper. Commercial products like Cryptosteel, Bilodex, CRYPTOTAG Zeus, and similar devices provide pre-made metal seed phrase storage. These products typically support either stamped letters or sliding tiles for each word. For holdings above a few thousand AUD, metal backup is strongly recommended.

 

Metal alternatives: If you cannot afford commercial metal products, a hardware store letter stamp set and a stainless steel plate (available from metal suppliers for a few AUD) achieves the same durability. The key specifications are stainless steel (rust-resistant), 1-2mm thickness minimum, and legible stamping depth. Some users engrave rather than stamp; engraving produces finer marks that may become difficult to read if oxidised or damaged.

 

Word abbreviations for metal: BIP-39 words are designed so the first four letters uniquely identify each word in the list. This allows stamping only the first four letters of each word, halving the space required on a metal plate without losing any information. SEED can identify SEED; GRAV identifies GRAVITY; ABAN identifies ABANDON. Verify abbreviations against a BIP-39 word list before relying on this approach.

 

Commercial Metal Products

Cryptosteel Capsule: A stainless steel tube with sliding letter tiles inside, assembling the seed phrase without stamping tools. Waterproof, corrosion-resistant, and rated to survive extreme temperatures. Supports up to 123 characters. The assembly process requires care but no specialised tools. Available from hardware wallet retailers.

 

CRYPTOTAG Zeus: A titanium plate designed for letter stamping, with pre-drilled holes for each word position. Titanium is lighter than steel and similarly durable. Zeus includes a stamping hammer and guides. Premium price point reflects the titanium construction and included tools.

 

Bilodex: Uses a bolt system with letter tiles, producing a compact backup. Various models support different word counts. The bolt-and-nut design makes tiles difficult to dislodge accidentally.

 

Choosing: For most users, any reputable metal product is equivalent in protection. The key criteria are: genuine stainless steel or titanium (not cheap alloys), ability to record all 24 words in full or 4-letter abbreviations, legibility, and tamper evidence (you want to know if someone has accessed it). Understand how to evaluate crypto products safely to avoid counterfeit or low-quality options from unauthorised sellers.

 

Storage Locations: Where to Keep Your Backup

Having the right material is only half of seed phrase storage. Where you store it determines whether it survives disasters and whether it remains secure from theft.

 

Home safe: A quality fireproof and waterproof home safe provides good protection for a primary backup. Critical: not all “fireproof” safes meet the same standard. A safe rated for 30 minutes at 1,000°F (538°C) protects paper documents. A safe rated for 60 minutes at higher temperatures provides better margins. Safes must be bolted to structural elements to resist removal theft. A heavy floor safe or wall safe that cannot be carried out of the home is significantly more secure than a lightweight portable safe.

 

Bank safety deposit box: A secondary copy in a bank safety deposit box provides geographic redundancy and institutional-level physical security. Banks typically charge $100-300 AUD per year for safety deposit boxes. Important considerations: safety deposit boxes are not insured by banks, bank access may be restricted in some circumstances, and the box must be accessed periodically to verify contents remain intact. Some jurisdictions have seen estate complications when safety deposit box holders die; document the existence and instructions clearly for estate planning.

 

Trusted family member location: For geographic redundancy, some holders split backup copies between their home and a family member’s home in a different suburb or city. This provides protection against localised disasters. Considerations: the family member becomes aware that crypto is held (even if not given the seed phrase contents), and access depends on the family relationship remaining intact. Consider using a sealed opaque envelope so the family member cannot read the contents, or using Shamir’s Secret Sharing to split the backup.

 

Avoid: storing backups at work (office access by multiple people, office fires or floods affect the backup alongside your home potentially), in a safe with obvious crypto labelling (a bright yellow label reading “CRYPTO SEED PHRASE” on a home safe advertises the target to any burglar who enters), in a location you rent (you may lose access unexpectedly), or in any location you could forget or lose access to.

 

Advanced Backup Strategies

For significant crypto holdings, basic single-copy physical backup may be inadequate. Advanced strategies trade complexity for improved security margins.

 

Two-location physical redundancy: The simplest advanced strategy is creating two identical metal backups and storing them in different geographic locations. Both must be equally secure, since either one alone is sufficient to recover the wallet. The protection provided is against single-location disasters: a house fire, flood, or burglary that destroys or takes one copy leaves the other intact. This is the minimum strategy for holdings that would be financially devastating to lose.

 

Passphrase (25th word): Hardware wallets support an optional passphrase that extends the seed phrase with an additional word you choose. This passphrase creates a completely different wallet derived from the same seed phrase, providing two layers of security: the seed phrase and the passphrase. Even if your seed phrase is discovered, an attacker cannot access your real funds without the passphrase. The passphrase should be memorised or stored separately from the seed phrase, never with it. This also enables plausible deniability: a small “decoy” wallet on the base seed phrase and the real holdings behind the passphrase. See the hardware wallet guide for full passphrase implementation details.

 

Shamir’s Secret Sharing (SLIP-39): Some hardware wallets (Trezor Model T, Trezor Safe 3) support SLIP-39, which splits the seed phrase into multiple shares using Shamir’s Secret Sharing algorithm. A 2-of-3 SLIP-39 scheme generates 3 shares; any 2 of the 3 can reconstruct the seed phrase, but any 1 share alone reveals nothing about the original seed. This eliminates both single-point-of-failure and single-point-of-compromise: one share stolen reveals nothing; one share lost still allows recovery with the other two. Shares can be stored in separate locations with different trusted parties. The complexity is higher than standard seed phrase backup but proportionally justified for very large holdings.

 

Multi-signature wallets are a different approach to distributed security: rather than protecting a single wallet’s backup, multi-sig requires multiple separate wallets to sign every transaction. A 2-of-3 multi-sig holds funds that require any 2 of 3 hardware wallets to approve spending. Each device has its own seed phrase, stored separately. Even if one seed phrase is compromised, the attacker cannot move funds without a second device. Multi-sig is the professional-grade security standard for holdings above $100,000 AUD and is used by crypto funds, DAO treasuries, and high-net-worth individuals.

 

Verifying Your Backup: The Recovery Test

Writing down a seed phrase does not guarantee it is correct. The only way to know your backup works is to test it before you load funds onto the wallet. This is one of the most commonly skipped steps and one of the costliest omissions.

 

Recovery test procedure: After generating a new wallet and writing down the seed phrase, reset the device (on hardware wallets, this wipes the device’s stored keys), then enter the backup seed phrase to restore the wallet, and verify that the same wallet addresses are generated after recovery. If the addresses match, your backup is correct and verified. If they do not match, your backup has an error. Do this before sending any funds to the wallet.

 

Error checking: Common backup errors include missing words, transposed words, incorrectly written words (the BIP-39 word “absent” vs “abstain” are different; all 2,048 words are distinct), and wrong word order. Hardware wallets validate each word against the BIP-39 list during entry, flagging unrecognised words. However, a valid BIP-39 word in the wrong position will not be caught by word-level validation: only the full address verification confirms the entire phrase is correct.

 

Periodic verification: For long-term cold storage, verify your backup remains readable and accessible annually. Metal plates do not degrade but can become difficult to access (forgotten combination, changed location, sealed envelope that you forget the contents of). A yearly verification routine that confirms you can still locate and read your backup prevents the accumulation of silent failure modes over time.

 

Seed Phrase Security Practices: What to Never Do

The seed phrase security failures that cause loss follow predictable patterns. These prohibitions are non-negotiable for secure self-custody.

 

Never photograph your seed phrase. Camera roll photos automatically sync to iCloud, Google Photos, Samsung Gallery Cloud, and other cloud services. Any attacker who accesses these services (or who steals your phone) gains access to every photo, including your seed phrase. This is one of the most common crypto theft vectors and has caused numerous cases of fund loss. If you accidentally photographed your seed phrase, assume it is compromised and move your funds to a new wallet immediately.

 

Never type your seed phrase into any computer, phone, or online service. Keyboard loggers, screen capture malware, browser extensions with clipboard access, and remote access trojans can intercept text you type on any device. There is no such thing as a “secure enough” computer for typing a seed phrase. If a website or app prompts you to “enter your recovery phrase to verify your wallet” or “restore access to your account,” it is a phishing attack. Recovery phrase scams specifically target users at moments of apparent technical problems.

 

Never share your seed phrase with customer support. No legitimate hardware wallet manufacturer, software wallet provider, or exchange will ever ask for your seed phrase to resolve a support issue. Anyone who asks for it is attempting to steal your funds. Genuine support requests involve verifying your identity, confirming wallet addresses, or troubleshooting connectivity, never accessing your seed phrase. If you receive an unsolicited message offering to help with your wallet and requesting your recovery phrase, it is a scam.

 

Never store your seed phrase in a password manager. Password managers are excellent for storing complex passwords to websites and services. They are not appropriate for seed phrases. A compromised password manager account (through a data breach, master password theft, or malware) exposes every stored item including your seed phrase. The attack surface of a password manager (accessible from any internet-connected device) is fundamentally incompatible with the security model of a seed phrase that should never touch the internet. Understand how crypto security practices differ from standard digital security.

 

Inheritance and Estate Planning for Seed Phrases

A secure seed phrase that no one else can find or access after you die is not a security success: it is a permanent loss. Estate planning for crypto holdings is an often-overlooked dimension of seed phrase management, but the ATO and Australian estate law treat crypto holdings as property subject to standard inheritance and probate processes.

 

Documentation for executors: Your estate documents should include instructions for finding your crypto holdings and seed phrase backups without actually including the seed phrase in the will (wills become public documents at probate). A private sealed letter to your executor, a secure note in a safety deposit box alongside your seed phrase, or specific instructions in a trust document are appropriate vehicles. The executor needs to know: that crypto holdings exist, what wallets are involved, where seed phrase backups are located, and any passphrase or additional information needed to access the wallets.

 

Timing considerations: Capital gains tax obligations on crypto holdings pass to estates and beneficiaries under standard Australian crypto tax rules. Beneficiaries who inherit crypto and immediately sell may face different tax treatment than those who hold. Estate planning should consider the tax implications of different distribution strategies, particularly for holdings with large unrealised capital gains. Consult an accountant familiar with ATO crypto tax treatment when structuring crypto inheritance plans.

 

Key Takeaways

A seed phrase is a 12-24 word master key that recovers your entire crypto wallet on any compatible device: securing it correctly is the most important step in self-custody. Never store seed phrases digitally: no photos, no text files, no password managers, no cloud storage. Use permanent physical media: acid-free paper with archival ink for smaller holdings, stainless steel or titanium plate products for significant holdings. Store in at least two geographically separate secure locations: a home safe plus a bank safety deposit box is the standard approach. Verify your backup with a recovery test before loading funds. Advanced strategies include passphrases (25th word), Shamir’s Secret Sharing, and multi-signature setups for large holdings. Never share with customer support, never type into any computer, and never photograph: these prohibitions prevent the vast majority of seed phrase theft. Ensure your estate plan includes instructions for your executor to locate and access your backups after your death, without including the actual phrase in public documents.

WRITTEN & REVIEWED BY Chris Shepley

UPDATED: MARCH 2026

Choose your next topic from our Cryptopedia​