D CryptoHome
lang: zh en ja ko
Home Wiki Categories Download Download Register

How to Back Up a Crypto Wallet: Secure Seed Phrase Storage Guide

Download Binance APP to Start Trading

Android users can download APK directly without VPN.

In the crypto world, "Not your keys, not your coins" is the most fundamental security principle. But owning your private keys is only the first step — the real challenge is how to safely back up and store your private keys and seed phrases. It is estimated that approximately 20% of all Bitcoin is permanently inaccessible due to lost private keys. This article provides a comprehensive guide to wallet backup and recovery best practices.

1. Backup Fundamentals

1.1 What Needs to Be Backed Up

Backup Item Format Notes
Seed Phrase (Recovery Phrase) 12/24 English words Most important backup — restores the entire wallet
Private Key 64-character hexadecimal string Corresponds to a single address
Keystore file Encrypted JSON file Must be used with a password
Wallet password Custom string Unlocks the wallet locally or decrypts the Keystore
Derivation path e.g., m/44'/60'/0'/0 Ensures the correct address is found during recovery

1.2 Understanding Seed Phrases

A Seed Phrase (Recovery Phrase / Mnemonic) is a sequence of words generated from a list of 2,048 English words according to the BIP39 standard.

How a seed phrase works:

  1. The wallet generates a random number (entropy)
  2. The random number is encoded into 12 or 24 English words
  3. A master private key is derived from the seed phrase
  4. Multiple child private keys are generated from the master key following a derivation path
  5. Public keys and addresses are computed from each child private key

Key properties of seed phrases:

  • 12 words = 128-bit security; 24 words = 256-bit security
  • Word order is critical — a different order means a different wallet
  • The last word contains a checksum (an incorrect word will be detected)
  • The same seed phrase restores the same wallet across different wallet apps (when using the same standard and derivation path)

1.3 Private Key vs Seed Phrase

Comparison Seed Phrase Private Key
Coverage Can derive unlimited private keys Corresponds to only one address
Format Human-readable English words Hexadecimal string
Portability Cross-wallet compatible (BIP39 standard) Depends on the chain's format
Backup priority Highest Needed in specific scenarios

Conclusion: In the vast majority of cases, backing up your seed phrase is sufficient. It can restore all of your addresses and assets.

2. Seed Phrase Storage Options

2.1 Paper Backup

The simplest and most widely used method.

How to do it:

  1. Write clearly on clean paper with a ballpoint pen
  2. Number each word to prevent order confusion
  3. Double-check after writing
  4. Place the paper in a waterproof bag
  5. Store in a secure physical location

Advantages:

  • Simple and low-cost
  • Completely offline — no risk of digital exposure
  • Requires no technical knowledge

Disadvantages:

  • Not fireproof or waterproof without extra protection
  • Paper may fade over time
  • Can be physically discovered and stolen

Enhanced approach:

  • Use waterproof ink and waterproof paper
  • Place in a sealed waterproof bag
  • Store in a safe or fire-resistant lockbox
  • Keep multiple copies in different locations

2.2 Metal Backup

The most durable physical backup option.

Popular metal backup tools:

Product Type Material Price
Cryptosteel Capsule Sliding letters Stainless steel ~$80
Billfodl Sliding letters Stainless steel ~$60
Seedplate Stamped Titanium ~$50
Blockplate Stamped Stainless steel ~$30
Stamp Seed DIY stamping Stainless steel ~$50

Metal backup advantages:

  • Fireproof: Withstands temperatures above 1,000°C
  • Waterproof: Unaffected by water
  • Corrosion-resistant: Stainless steel / titanium is highly resistant to corrosion
  • Durable: Can last for decades or even centuries

How to use (Cryptosteel Capsule example):

  1. Open the capsule
  2. Arrange the first four letters of each seed word using letter tiles
  3. Slide them into the capsule slots in order
  4. Lock the capsule
  5. Store in a secure location

2.3 Shamir Secret Sharing

Suitable for users with high security requirements.

Principle: Split the seed phrase information into N shares, where only M shares (M < N) are needed to recover the wallet.

Option 1: Trezor's Shamir Backup (SLIP39)

  • Natively supported on the Trezor Model T and Safe 5
  • The device handles the splitting automatically
  • Example: Any 3 of 5 shares can restore the wallet

Option 2: Manual splitting (simplified version)

  • Divide the 24 words into 3 groups of 8 words each
  • Create 3 cards, each containing 2 groups (16 words total)
  • Any 2 cards are sufficient to recover all 24 words
  • A single card does not contain complete information
Card Words Contained
Card A Words 1–8 + Words 9–16
Card B Words 1–8 + Words 17–24
Card C Words 9–16 + Words 17–24

Note: This simplified splitting scheme has lower security than true Shamir Secret Sharing, since each card exposes two-thirds of the information.

2.4 Storage Methods to Absolutely Avoid

Method Reason
Screenshot saved to phone gallery Can be read by malicious apps or leaked via cloud sync
Text file on a computer May be stolen by viruses or trojans
Cloud storage (iCloud / Google Drive) Leaked immediately if the cloud account is compromised
Sent via messaging app or email Communications can be intercepted; servers can be breached
Stored in a password manager Leaked if the password manager is compromised
Memory only Human memory is not reliable

3. Multi-Backup Strategy

3.1 Basic Backup Plan (for general users)

  • Number of copies: 2 paper backups
  • Storage locations: Home safe + a relative's home or bank safety deposit box
  • Additional measures: Inspect backup integrity periodically (e.g., every six months)

3.2 Standard Backup Plan (for moderate asset holders)

  • Number of copies: 1 metal backup + 1 paper backup
  • Storage locations: 3 different physical locations
  • Additional measures:
    • Metal backup at the primary secure location
    • Paper backup as an emergency reserve
    • Periodically verify backup usability

3.3 Advanced Backup Plan (for large asset holders)

  • Backup method: Shamir splitting (3-of-5)
  • Storage medium: Metal backup plates
  • Storage locations: 5 different secure locations
    • Location 1: Home safe
    • Location 2: Bank safety deposit box
    • Location 3: Law firm
    • Location 4: Trusted family member
    • Location 5: Another secure storage location
  • Additional measures:
    • Each location is unaware of the others
    • Include recovery instructions in your estate plan
    • Annual verification

4. Wallet Recovery Operations

4.1 Recovering MetaMask

  1. Install MetaMask
  2. Select "Import existing wallet"
  3. Enter the 12 seed words (separated by spaces)
  4. Set a new password
  5. Recovery complete

Note: After recovery, only the default first address is visible. If you previously created multiple accounts, you need to manually "Add account" to recover subsequent addresses.

4.2 Recovering Trust Wallet

  1. Install Trust Wallet
  2. Select "Import existing wallet"
  3. Select "Multi-coin wallet"
  4. Enter your 12/24 seed words
  5. Set a password
  6. Recovery complete

4.3 Recovering Ledger

  1. Obtain a new Ledger device
  2. During initialization, select "Restore from Recovery Phrase"
  3. Choose the seed phrase length (12/18/24 words)
  4. Enter each word on the device
  5. Set a new PIN
  6. Install the required apps
  7. Add accounts in Ledger Live

4.4 Cross-Wallet Recovery

Reasons why the same seed phrase may show different addresses in different wallets:

  • Different derivation paths are used
  • Different address types (e.g., Bitcoin Legacy vs SegWit)

Common derivation paths:

Chain Derivation Path Standard
Ethereum (most wallets) m/44'/60'/0'/0 BIP44
Bitcoin (Legacy) m/44'/0'/0'/0 BIP44
Bitcoin (SegWit) m/84'/0'/0'/0 BIP84
BSC m/44'/60'/0'/0 Same as Ethereum
Solana m/44'/501'/0'/0' BIP44

If you cannot find your address after recovery, try using a different derivation path.

4.5 Recovery Verification

Verify your backup immediately after creating a wallet:

  1. Transfer a small amount of assets to the new wallet
  2. Recover the wallet using the seed phrase on a separate device
  3. Confirm that the same address and balance are visible
  4. Confirm that transactions can be sent normally
  5. After verification, delete the test-recovery wallet

5. Emergency Situations

5.1 If Your Seed Phrase May Have Been Compromised

If you suspect someone else may have seen or obtained your seed phrase:

  1. Create a new wallet immediately (with a completely new seed phrase)
  2. Transfer all assets to the new wallet as quickly as possible
  3. Prioritize the highest-value assets
  4. Include all tokens and NFTs across all chains
  5. Do not forget assets staked or lent out in DeFi protocols
  6. Once the transfer is complete, treat the old wallet as abandoned

5.2 If Part of Your Seed Phrase Is Lost

If you have lost 1–2 words from your seed phrase:

  • In theory, recovery by brute force is possible (since the BIP39 word list only has 2,048 words)
  • Open-source tools exist to assist with recovery (e.g., btcrecover)
  • Losing 3 or more words makes recovery practically impossible
  • If the asset value is significant, consider contacting a professional crypto asset recovery service

5.3 Lost or Damaged Device

Hardware wallet lost:

  1. Use your seed phrase to recover on a new device
  2. If you are concerned about physical tampering, transfer assets to a new wallet

Mobile phone lost (software wallet):

  1. Install the wallet app on a new phone
  2. Recover using your seed phrase
  3. If the phone had no screen lock, transfer assets immediately

5.4 Estate Planning

Crypto asset estate planning is an overlooked but critically important topic:

Option 1: Sealed letter

  • Place the seed phrase and recovery instructions in a sealed envelope
  • Hand it to an attorney or store in a bank safety deposit box
  • State in your will that this envelope exists and how to use it

Option 2: Multi-sig / social recovery

  • Use a multi-sig wallet where family members hold some signing keys
  • Set up a social recovery mechanism (e.g., Safe's Guardian feature)
  • Regularly walk family members through the recovery process

Option 3: Professional services

  • Use estate planning services from providers like Casa
  • Professional key custody and recovery services

6. Password Security

6.1 Wallet Password

While the wallet password (local unlock password) is less critical than the seed phrase, it still needs to be managed securely:

  • Use a strong password (uppercase + lowercase + numbers + special characters, 12+ characters)
  • Do not reuse passwords from other services
  • Wallet passwords can be stored in a password manager (seed phrases cannot, but passwords can)

6.2 Two-Factor Authentication

For all accounts related to your crypto assets (exchanges, email, etc.):

  • Enable two-factor authentication (2FA)
  • Prefer an Authenticator app (e.g., Google Authenticator)
  • Avoid SMS-based verification (can be hijacked via SIM swapping)
  • Back up your 2FA recovery codes

6.3 Passphrase

Some wallets (such as Trezor) support adding a Passphrase on top of the seed phrase:

  • The Passphrase acts as a "25th word"
  • Same seed phrase + different Passphrase = different wallet
  • The Passphrase must be backed up separately
  • Forgetting the Passphrase means losing access to the assets in the corresponding wallet

7. Common Mistakes and Lessons Learned

7.1 Real-World Case Studies

Case 1: James Howells

  • In 2013, accidentally discarded a hard drive containing the private key to 7,500 BTC
  • Has repeatedly been denied permission to excavate the landfill
  • Worth hundreds of millions of dollars at current prices

Case 2: Stefan Thomas

  • An IronKey hardware-encrypted USB drive contains 7,002 BTC
  • Forgot the password; 8 of 10 attempts have been used
  • The drive will be permanently encrypted if the remaining 2 attempts fail

7.2 Most Common Backup Mistakes

  1. Only one backup: If that copy is lost, the assets are gone forever
  2. Backup stored insecurely: Kept in plain sight, easy to find
  3. Transcription errors: A single wrong letter could make recovery impossible
  4. No periodic verification: The backup may already be damaged without you knowing
  5. Telling too many people: The more people who know, the greater the risk of exposure
  6. Over-relying on memory: Human memory degrades over time
  7. Never tested recovery: Never verified that the backup can actually restore the wallet

8. Backup Security Checklist

When creating a wallet:

  • [ ] Generate the seed phrase in a secure environment (offline, no one watching)
  • [ ] Write down the seed phrase with pen and paper (not on an electronic device)
  • [ ] Verify accuracy (check each word)
  • [ ] Prepare at least 2 copies
  • [ ] Store copies in different secure locations
  • [ ] Test the recovery process to confirm the backup works

Ongoing maintenance:

  • [ ] Check backup integrity every six months
  • [ ] Confirm that storage locations remain secure
  • [ ] Keep wallet software / firmware updated
  • [ ] Do not use the seed phrase in insecure environments

After asset growth:

  • [ ] Evaluate whether a backup upgrade is needed
  • [ ] Consider switching from paper to metal backup
  • [ ] Consider Shamir splitting or multi-sig solutions
  • [ ] Develop an estate plan

Summary

Wallet backup is the last line of defense for crypto asset security. You can change your wallet software, swap out hardware, replace your computer or phone — but you cannot afford to lose your seed phrase. A lost seed phrase means permanently lost assets, with no institution able to help you recover them.

The most essential advice: prepare at least 2 physical backups stored in different secure locations, and periodically verify their integrity. As your asset holdings grow, gradually upgrade to metal backups and Shamir splitting. Find the balance between security and convenience that works for you — but never compromise on security.

Register on Binance | Download Binance App

📱
Download Binance APP to Start Trading

Android users can download APK directly without VPN.

Download Binance APP to Start Trading

Android users can download APK directly without VPN.

Author
CryptoHome Editorial Team Dedicated to crypto knowledge and encyclopedia writing