Search content
Sort by

Showing 20 of 256 results by Meuserna
Post
Topic
Board Hardware wallets
Re: Ledger Live breach, potential stolen assets
by
Meuserna
on 20/07/2025, 23:45:10 UTC
still not hacked



How do you know this? There have been complaints from users claiming that their funds disappeared without any apparent reason from addresses controlled by Ledger devices. It's the fact confirmed through their online backup service that Ledger's code allows for seed phrase extraction. Of course Ledger officials deny under oath any connection between these incidents and their close code but the question remains at least for me whether should we trust what they are saying.

Adding to what you said:  Ledger also pays bounties to hackers while making them sign nondisclosure agreements in exchange for the funds.  Bounties are a common practice, not just for Ledger.  But Ledger forces nondisclosure agreements and then lies, saying they've never been hacked.  For example:

Quote
In this post, I’m going to discuss a vulnerability I discovered in Ledger hardware wallets. The vulnerability arose due to Ledger’s use of a custom architecture to work around many of the limitations of their Secure Element.

An attacker can exploit this vulnerability to compromise the device before the user receives it, or to steal private keys from the device physically or, in some scenarios, remotely.

I chose to publish this report in lieu of receiving a bounty from Ledger, mainly because Eric Larchevêque, Ledger’s CEO, made some comments on Reddit which were fraught with technical inaccuracy. As a result of this I became concerned that this vulnerability would not be properly explained to customers.

--Saleem Rashid
https://saleemrashid.com/2018/03/20/breaking-ledger-security-model

Some things never change.  Ledger can't be trusted.
Post
Topic
Board Hardware wallets
Merits 4 from 2 users
Re: Ledger Recovery Key: Ledger Recover 2.0?!
by
Meuserna
on 24/06/2025, 18:18:26 UTC
⭐ Merited by dkbit98 (3) ,ABCbits (1)
It's open source!  ...except for the part that isn't, which means you can add that lie to the long list of Ledger lies.

Any closed source code means the code isn't open source, because the code contains code that isn't published and thus cannot be verified to be safe.
Post
Topic
Board Hardware wallets
Re: Is a ledger nano x still a safe cold storage wallet to use
by
Meuserna
on 20/06/2025, 18:52:30 UTC
I dont have the skills or technical expertise to audit code myself but I can check around to see what the experts are saying, what multiple sources are reporting.

That, right there.  That's exactly it.

The code for this stuff is beyond my abilities, so I stick to hardware wallets that are open source and whose code is used by experts I trust.  It's even better if their code is added to or improved by experts I trust.
Post
Topic
Board Hardware wallets
Re: Is a ledger nano x still a safe cold storage wallet to use
by
Meuserna
on 20/06/2025, 07:16:52 UTC
I'd be careful about using an obsolete device that no longer receives firmware updates, even if it doesn't have ledger recover.

I say this with all due respect.

Prove the Ledger Nano doesn't have any of the code that enables Ledger and other companies to gain access to the user's seed.  Don't quote Ledger.  Ledger has lied many times about many things, so the value of their word is zilch.  Prove it.  You can't, which means the device can't be trusted.

That's the difference between open source and closed source.

With open source code, if somebody has doubts, you give them the link to the code.  It's all there, published for the world to see.

With closed source code, there's no way to prove anything.  And since Ledger has lied so many times about so many things, anyone who trusts them is either ignorant, meaning they don't know better, or they're just plain stupid.  Ledger had to scrub their entire website to remove lies.

Too many people trust their Bitcoin to companies that lie to them, and Ledger is the worst of the worst.

No Ledger device can be trusted, long term.
Post
Topic
Board Hardware wallets
Re: Help needed: my BTC and ETH disappeared from Ledger Nano S wallet (1 BTC + 0.3 E
by
Meuserna
on 24/04/2025, 19:57:26 UTC
I agree, the most likely scenario here is that somebody found the OP's seed.  Let's say it was stored in a safe.  Somebody found the combo, or somebody found the key.  Remember, OP: they don't need to steal the paper your seed is written on.  They'd just take a picture of your words.  That's all they need to steal your coins later.

Even if the PC is infected, a seed generated by a hardwallet cannot be exposed, since it was generated on the device itself, offline

Ledger hardware uses closed source code, so there's no way to prove that is true.  Sadly.  It is possible that seeds on Ledger hardware can be accessed over the internet.  The code is closed source, so we just don't know.  I wish people would stop making assumptions about the safety of devices that run closed source code.

Closed source code is like a meal where the cook won't tell you what's in it.

Closed source code cannot be trusted, because closed source code cannot be verified.  Anyone who says otherwise is someone you should not trust, if you value the security of your Bitcoin.

To the OP
I saw that you started your wallets in 2022, and it was only in 2023 that this balance was moved, which following logic, must not have been a hack at the time of creating your wallet but something later, since a hack would make the transfer at the same time as it had access to your wallet

Probably, but not necessarily.  There's always the chance that somebody who hacked Ledger's code would sit on keys they acquire in order to not let Ledger know their code has been hacked.  I don't think this is likely in this case though, but it's a possibility.

I strongly suspect that when the code for Ledger gets hacked, we won't know about it for months, if not longer, because the hackers would want to steal as many keys as possible before Ledger realizes there's a problem, since patching the code would cut off the hacker's access to stealing people's keys.

Closed source code cannot be trusted, because closed source code cannot be verified.  Anyone who says otherwise is someone you should not trust, if you value the security of your Bitcoin.
Post
Topic
Board Hardware wallets
Merits 1 from 1 user
Re: OneKey Hardware Wallet HACKED!
by
Meuserna
on 22/04/2025, 19:02:19 UTC
⭐ Merited by JayJuanGee (1)
Makes you wonder how difficult it would be to make a QR and software that gave 3 different seeds.
 
1) Fully unencrypted, but valid, this way if someone finds it they get whatever little amounts of crypto you had on it. (Hot wallet)

2) Encrypted and you have to enter a password to get that seed. (Warm wallet)

3) Encrypted, but you have to scan with a different piece of software and enter a password that then generates another QR code that you then scan with something like Krux (cold storage)

Might be more Rube Goldberg then really needed but seems like an interesting concept.

-Dave

You're on the right track - but don't think of it as a QR code.  Think of it as data.  A QR code is just a visual representation of data.  Scan the code to transcribe the data.

I would think of it like this:

How difficult it would be to make a string of data that can be recovered two different ways:

1) Unencrypted, but valid.  For example, as a decoy seed.

2) Encrypted and you have to enter a decryption key to get the real seed.  A decryption key is just a password or passphrase.  It's whatever you set up as the decryption key.

As for your original #3:

Quote
3) Encrypted, but you have to scan with a different piece of software and enter a password that then generates another QR code that you then scan with something like Krux (cold storage)

You can do that now, with Krux.  Here's how.

Create an encrypted QR code.

Let's say this is your seed phrase:

"maid water stomach exhibit much wood useless blood debris reject either green"

To make this easier to talk about, let's call that seed phrase "Green."

And let's say you want to protect it with a crazy strong passphrase.  Use Krux to make an encrypted QR code for this long passphrase (which is actually a seed phrase):

"claim pigeon depth cook clerk paper merge bachelor winner patrol surprise muffin"

To make this easier to talk about, let's call that passphrase "Muffin."

And let's say this is the decryption key for Muffin:

"nine sky red truck"

Here's the magic:  Use Krux to create an encrypted QR for your Green seed phrase, using Muffin as the decryption key (the passphrase).

So...  to decrypt your seed phrase, you'd use 2 Krux devices.

Krux A:  Scan Muffin and enter the passphrase to decrypt it: "nine sky red truck"  Then have Krux show you a plaintext QR code for Muffin.

Krux B:  Scan your Green seed, then scan Muffin on your other Krux to decrypt it.
Post
Topic
Board Hardware wallets
Merits 1 from 1 user
Re: OneKey Hardware Wallet HACKED!
by
Meuserna
on 22/04/2025, 05:43:44 UTC
⭐ Merited by JayJuanGee (1)
This is yet another example of why I'm not a fan of saving a seed on a hardware wallet.  Every secure element will eventually get hacked, meaning you'll need to upgrade again and again.

There's a better way.

With a device like Krux or SeedSigner, you can save your seed on a QR code that you scan in order to load your seed.  There's no need for a secure element chip or even a PIN code to unlock the device since there's nothing saved on the device.  Plus, it's fully airgapped.

And with Krux, you can save your seed as an encrypted QR.  If somebody finds your encrypted QR, they can't scan it without the decryption key.

If somebody steals your device?  No worries.  There's nothing on it.  And if you use an encrypted QR, no worries if somebody finds it.  They can't scan it without the decryption key.

Best of all, the encryption is open source.  It's industry standard CBC encryption with as strong of a decryption key as you choose.  You can even save your decryption key as a QR.

Companies that make hardware wallets are never going to use the Krux/SeedSigner way of loading seeds via QR because they make money through hardware sales and upgrades.  "Oh, no!  Last year's secure element chips have been hacked!  Better upgrade to the latest model!"  It's ridiculous, but I don't blame them.  It's a business model that works.  I don't have to worry about any of that though.  I never save my seed on a device.

Pro Tip!  There's a fork for SeedSigner that enables encrypted QRs too.
Post
Topic
Board Hardware wallets
Re: Tangem collecting user seedphrases?
by
Meuserna
on 08/04/2025, 19:28:33 UTC
If you didn't communicate with their support during one week after your imported you SEED your stash should be safe

How do you PROVE it?

I'll never understand why people put their Bitcoin at risk by using closed source wallets, especially when there are outstanding fully open source alternatives.
Post
Topic
Board Hardware wallets
Merits 27 from 4 users
Re: Ledger Recovery - Send your (encrypted) recovery phrase to 3rd parties entities
by
Meuserna
on 26/02/2025, 21:16:54 UTC
⭐ Merited by LoyceV (24) ,HeRetiK (1) ,examplens (1) ,dkbit98 (1)
I strongly encourage you to read more about the Bybit hack.

This will happen to Ledger.  It's just a matter of time.

Quote
North Korean hackers managed to pull off the biggest hack in history by planting malicious code into the infrastructure of Safe—a crypto wallet provider used by Bybit, and one that has long marketed itself as impenetrable.

https://decrypt.co/307866/how-bybit-hacked-1-4-billion-ethereum

Now, to put that in context for Ledger:

Ledger created an API to enable key extraction from Ledger hardware devices over the internet.  It's baked in to the Ledger firmware.  That will get hacked.  It's a question of when, not if.

Quote
"yes a firmware update can extract the seed"
-- murzika, Ledger Co-Founder, Former CEO, and Former Chairman
https://np.reddit.com/r/CryptoCurrency/comments...

Ledger holds the master key for their key extraction scheme, which includes access to all keys stored on Ledger's servers and other companies' servers, using Ledger Recover.  That will get hacked.  It's a question of when, not if.

Quote
"The bombshell here is the explicit confirmation that Ledger themselves hold the master decryption key for all Ledger Recover users."

-- @sethforprivacy
https://twitter.com/sethforprivacy/status/1671532787294191618

And, making matters worse, Ledger's codebase has been hacked.

Quote
How a Single Phishing Link Unleashed Chaos on Crypto:  "Ledger has confirmed the attack began because “a former Ledger employee fell victim to a phishing attack.”

-- Decrypt, December 14th, 2023
https://decrypt.co/209838/single-phishing-link-unleashed-chaos-on-crypto

For hardware wallet users, the lesson to be learned is this:

Never use a hardware wallet that allows internet access to the device.  No exceptions.  Your keys need to be where hackers cannot reach them over the internet.

I assume everybody here understands how hardware wallets generate transaction signatures without accessing the internet, but if you're not clear on how that works, I'd encourage you to learn about it.  Understanding how this stuff works helps to keep you safe.

Ledger's code enables key extraction from the device over the internet.  Ledger devices can't be trusted.  Ledger lied about it, every step of the way.  Ledger can't be trusted.

Never use a hardware wallet that allows internet access to the device.  No exceptions.
Post
Topic
Board Hardware wallets
Re: Is a ledger nano x still a safe cold storage wallet to use
by
Meuserna
on 26/02/2025, 02:08:20 UTC
just because Ledger lied that the grass is blue and the sky is green, doesn't mean they also lied about milk being white.

That sentence should tell you everything you need to know.

It doesn't mean they also lied about milk being white.  It means they are a long-term provably untrustworthy source of information and security.
Post
Topic
Board Hardware wallets
Re: Is a ledger nano x still a safe cold storage wallet to use
by
Meuserna
on 25/02/2025, 00:40:32 UTC
I'd never trust Ledger.  I'm embarrassed that I ever trusted them in the first place.
Me neither.
Many people fell for their heavy advertisement and they paid good money for that promotion on youtube and social media.
Let me also add that ledger with their blind signing was one of the reasons was latest massive hack of bybit exchange.
Anyone still using closed source hardware wallet with blind signing should stop doing that asap.
From what I understood in the tweet they posted, the issue was the use of third-party software compatible with Ledger that didn't support Clear Signing.

https://x.com/Ledger/status/1893956121385165278

Ledger reinforced the use of Ledger Live which supports Clear Signing. This means there are many people interacting with tokens and smart contracts on third-party wallets connected to HW, where users are forced to use Blind Signing.

They also stated that they will take the initiative to ensure that third-party software compatible with Ledger provides support for Clear Signing.

In any case, it's recommended that all users verify what they are signing, no matter how confusing Eth and other network smart contracts may be. On BTC there are no such shitcoin complications.

Ledger's word means nothing.  What they say is irrelevant because their words cannot be trusted.

Ledger said your keys never leave your device while they were writing key extraction code.  Ledger said an employee was phished, but then had to admit it was a former employee.  Ledger prints "We are open source" on the box for hardware that runs closed source code.  Ledger says they've never been hacked but they pay bounties to those who hack them in exchange for their silence.  I wouldn't be surprised if we find out the company's name isn't even Ledger.  Nothing Ledger says can be trusted.  Nothing.  Ledger is dirtier than a pile of dirt on a dirt floor.
Post
Topic
Board Hardware wallets
Merits 1 from 1 user
Re: Is a ledger nano x still a safe cold storage wallet to use
by
Meuserna
on 24/02/2025, 20:13:33 UTC
⭐ Merited by dkbit98 (1)
I believe that if their sales drop critically, they will just release a new model that will not have the possibility of a Recover option and thus, at least apparently, they will restore trust again.

That would only restore a fool's trust.

The code is closed source and the company lies to their customers.  How can anyone ever believe a word anyone at Ledger says, ever again?  Only a fool would believe them.

This is what Ledger was saying while they were writing firmware for Ledger hardware wallets which enables key extraction over the internet.  This is what they were saying while working with other companies on a scheme to enable key extraction from users' hardware wallets over the internet:

Quote
"Hi - your private keys **never** leave the Secure Element chip, which has never been hacked. The Secure Element is 3rd party certified, and is the same technology as used in passports and credit cards.  A firmware update cannot extract the private keys from the Secure Element."

-- @Legder
https://twitter.com/Ledger/status/1592551225970548736

Lies.

Quote
Your keys are always stored on your device and never leave it

Lies.

And from the Ledger website:

Quote
"Private data, such as your private keys will be protected and never leave the device due to the combination of BOLOS and the Secure Element."

"The secret keys or seed are never exposed to the BLE stack and never, ever leave the Secure Element."

Those are lies.  They were saying that while writing the code to do it.  They were saying that while signing contracts with other companies to store the data for it.

They were saying that, while writing code to enable key extraction from users' devices over the internet, and they put that code on users devices before letting users know key extraction was now built into the firmware on their devices.

Only under great pressure did they finally admit this:

Quote
"yes a firmware update can extract the seed"

How could anyone ever trust Ledger again?

Ledger can't be trusted.
Post
Topic
Board Hardware wallets
Re: Using Two Trezor Devices on one Trezor Suite anyone do this?
by
Meuserna
on 24/02/2025, 02:27:11 UTC
~~~
I can't give an answer to OP's main question because I don't have multiple Trezor devices. I built myself a PiTrezor in the past and I guess I could simulate two or more Trezor One hardware wallets by using multiple microSD cards for the PiTrezor if I had the time and motivation to do it. (Likely won't happen any soon, sorry.)

But I'm not using my PiTrezor for more than Testnet coin wallets at best.

Do you know of a good guide for doing that?  Is PiTrezor a common term for it, or is that just what you call it?

It's a great idea.  I've been meaning to build one for a while.  It's on my long list of "I'll get around to it, eventually" projects.
Post
Topic
Board Hardware wallets
Re: Is a ledger nano x still a safe cold storage wallet to use
by
Meuserna
on 23/02/2025, 21:03:06 UTC
...but hopefully Ledger will somehow self destruct as a company OR people will wake up and see the truth behind their BS.
We should hope for the latter and not the former. Ledger self-destructing or getting rekd by someone would mean that a lot of people will lose a lot of money. I am talking about end-users, not Ledger and its team. Despite them thinking differently than other more knowledgeable bitcoin and crypto users, we shouldn't hope for their downfall. Such negative press is unwanted, sheds bad light on crypto, and results in a loss of confidence.

Users wouldn't be harmed by Ledger going bankrupt unless Ledger's code or keys end up in the wrong hands.

If Ledger goes bankrupt or collapses somehow, users' devices would still work.  Folks would need to switch to different hardware eventually, or they could keep using their Ledger hardware with other apps.  For Bitcoin, it's easy to use a Ledger with Electrum or Sparrow instead of that Ledger Live trash.  So that's not a problem for Bitcoiners.

The only thing that would harm users would be if Ledger's codebase or keys fell in the wrong hands:

Quote
"The bombshell here is the explicit confirmation that Ledger themselves hold the master decryption key for all Ledger Recover users."

-- @sethforprivacy
https://twitter.com/sethforprivacy/status/1671532787294191618

That's horrifying.

In theory, that would only affect users who subscribe to Ledger Recover.  In theory, anyway.

In reality, Ledger's code is closed source, so we have no way of knowing how much over the internet access Ledger has to the keys on Ledger hardware, but we do know they can access the user's keys.  We know Ledger can access the keys on Ledger devices over the internet, because that's what Ledger Recover does.  So, if anything goes wrong at Ledger, there's always the chance keys can be stolen from user devices the moment they turn 'em on.  Anyone who says otherwise is making unsafe assumptions.

Ledger can access a user's keys on that user's device over the internet.  That's what Ledger Recover does.

By baking the code for Recover into their hardware wallet firmware, Ledger created a time bomb.
Post
Topic
Board Wallet software
Re: Securing Your Seed Phrase with Washers
by
Meuserna
on 22/02/2025, 22:17:52 UTC
I think the bigger issue is if you get robbed and the piece of furniture is stolen by a thief
Who steals furniture nowadays? It's big and heavy.

I live in an area with a lot of younger people and some seasonals.  People get robbed.  Not all the time of course, but it happens.  There was a fake movers scam a while back that was brutal.
Post
Topic
Board Hardware wallets
Merits 6 from 3 users
Re: Is a ledger nano x still a safe cold storage wallet to use
by
Meuserna
on 22/02/2025, 20:35:19 UTC
⭐ Merited by The Sceptical Chymist (4) ,Forsyth Jones (1) ,dkbit98 (1)
I've had a Ledger Nano X for years, but I've never used it except for testing purposes. I recently used it on Ledger Live on iOS for the first time. I think the Ledger Live app (both for desktop and mobile) is very cluttered. It should be simpler, highlighting the options: send, receive, and view transaction history...

Ledger Live sold you out though.  It has tons of trackers that send out data about you and everything you do.

Quote
Ledger Live is phoning out data on assets you hold in your hardware wallet the moment you access Ledger Live. It’s also sending out tons of other information about your computer and device.

The app apparently transmits data to an external endpoint at “https://api.segment.io/v1/t”, identified as an outsourced data collection service.

--BitcoinNews.com
https://bitcoinnews.com/ledger-live-app-accused-of-collecting-user-data/)

That's bad.

I know people who trust older Ledger models more, such as the Ledger Nano S (not the plus model) that doesn't have ledger recover, but support, updates, and newly developed features are no longer the company's focus on this device.

People make the mistake of thinking "doesn't support" means "doesn't contain any of the code or vulnerabilities."

The code is closed source.  Even though the original Nano S doesn't support Ledger Recover, it doesn't mean the firmware doesn't contain any of the code that enables at least some form of internet access even if it's not supported.

This is especially an issue if they're reusing any code across devices.  Any sloppy work could create unintended vulnerabilities.  And Ledger has proven their work can be very sloppy, which is why they leaked their entire customer database a while back, and why former employees still had access to their codebase (and got phished).

And with the Nano X, you have the issue of bluetooth which means potential access for online hackers to reach the device.

I'd never trust Ledger.  I'm embarrassed that I ever trusted them in the first place.
Post
Topic
Board Wallet software
Re: Securing Your Seed Phrase with Washers
by
Meuserna
on 21/02/2025, 21:05:08 UTC
Hiding in plain sight Smiley Until someone for whatever reason has to access it and finds words on washers Cheesy

It's so strange that it can really work. At least I would never go to a place and start unscrewing furniture  Tongue

Yeah.  I think the bigger issue is if you get robbed and the piece of furniture is stolen by a thief who doesn't realize it has important info hidden in it.  Or worse: "Honey!  Surprise!  For your birthday, I got you a new (thing you had washers screwed into)!  I donated the old one to Goodwill."  Ruh roh.
Post
Topic
Board Hardware wallets
Re: Bitcoin Threat Model - State Actors and HW Security - Chip Supply Chain Attacks
by
Meuserna
on 20/02/2025, 23:13:47 UTC

Here's what BobbysTransactions said:

Quote
This is all irrelevant if the Kendryte K210 chip on your device is hard-coded with a back door to leak your private key subliminally in a signed transaction.

He's not familiar with this stuff at all.

First, K210 devices aren't hardware wallets.  They're primarily used to make DIY toy robots and old school 1980s style handheld video games.  The devs at Krux realized some K210 devices have a camera and a large screen, which makes the ones with no radios perfect for DIY airgapped hardware wallets.  Remember, we're talking about devices that cost as little as $35 (though I don't recommend the $35 ones.  They're tiny and don't have a touchscreen - they're more like a Jade).

Did you even read the whole thread? 

Okay, it's arguably better if the K210 chips are used for generic devices but the material point still stands: you cannot verify the hardware and backdoors can be inserted without your knowledge.

But you are trusting close source - just in hardware form.

The K210 hardware Krux runs on has no wifi.
It has no bluetooth.
And the device is not connected to a computer or phone.

The only ability the device has to reach the outside world is via QRs displayed on the screen, such as Bitcoin signatures.  And Bitcoin signatures are math.  If anything on a hardware wallet attempts to change any detail in a transaction, the signature will fail.

Remember: the "crypto" in cryptocurrency stands for Cryptography.  Bitcoin signatures are a form of cryptography that mathematically prove you have the keys to make one specific transaction without revealing the keys.  The signature will be different for every transaction because each signature must match the details of that specific transaction and the keys required to execute the transaction.

If any part of the transaction on the hardware wallet doesn't match what the coordinator app set up, the signature will fail because the math will fail.

Also, keep in mind, these K210 devices aren't designed to be used as Bitcoin wallets.  In fact, the use of them for Bitcoin wallets isn't even large enough to be part of the business model for the companies making these devices.  They're mostly for stuff like toy robots and handheld games.

Check this out:  Yahboom STM32 Self-balancing Robot Car--K210 module kit

But let's follow the hacking or malicious chip thought through.

Krux firmware wipes the device on install, so there's no threat of malicious code.  Krux isn't an app.  It's the OS and everything.

Even if a chip in the device was hacked at the factory to change any Bitcoin address it encounters or whatever you're imagining, every Bitcoin transaction would fail because the signature would fail because the data in the transaction on the coordinator app wouldn't match the hacked device's data.

Again, remember: these devices are QR in and QR out.

I assume you know the difference between a hardware wallet and a coordinator app.  The coordinator app has no access to the keys in the hardware wallet.  And the hardware wallet device doesn't know anything about the transaction in the coordinator app except for what it receives via the QR code.

The coordinator app generates a QR code from the unsigned transaction for the hardware wallet to sign.  The hardware wallet generates another QR code with the signature.

If the hardware wallet has been hacked to change the data in any way, the coordinator app won't accept the signature, because the signature won't be mathematically correct for the transaction on the coordinator app.

That's a really important concept to understand.

That's is how a hardware wallet keeps you safe.

An airgapped hardware wallet, such as this, is even better since there's no connection between it and any other device, including the coordinator app.

An airgapped hardware wallet just receives a QR code with the transaction details and generates a QR code with a signature for another device to scan.

Don't trust the QR code?  No problem.  It's just text.  Verify it.

Don't trust.  Verify.
Post
Topic
Board Wallet software
Re: Securing Your Seed Phrase with Washers
by
Meuserna
on 20/02/2025, 20:37:19 UTC
Take the bathroom door off its hinges.  Stamp the words into the side of the hinge that goes against the door and the door frame.  Put the door back up.
If you ever move, you'll have to replace the door hinges. Even if you move your funds, you don't want to leave any evidence for the new owner of your Bitcoin addresses.

You're right.  That's something to keep in mind.

I've been thinking about this stuff a lot lately because someone asked me how people in apartments can secure their seed phrase, and I realized I didn't like my answer.  My response is always "Write your seed words on paper.  Keep 'em in a safe.  Make a metal backup.  Keep it in a safe deposit box."  But many banks aren't doing safe deposit boxes anymore, and the kind of safe a typical apartment resident would have can be easily popped open or stolen and drilled.

That got me thinking about how to secure the words in metal somewhere that wouldn't be found or stolen, which led me to door hinges.  It's a big flat metal surface that can't be seen or accessed.

You'd definitely have to have some sort of reminder for yourself when you eventually move out, of course.

This stuff is fun to think about.  It's a challenge.
Post
Topic
Board Wallet software
Merits 2 from 1 user
Re: Securing Your Seed Phrase with Washers
by
Meuserna
on 20/02/2025, 08:28:48 UTC
⭐ Merited by LoyceV (2)
Allow me to quote myself:
You could for instance use the washers to hang 400 kg of concrete from your ceiling. After all, you're dealing with construction material. That'll make it hard to steal.
With just one washer, and text only on one side, I'd just mount it somewhere. M14 might look a bit out of place because of the size, so don't use it to hang a painting, but for sure you won't accidentally lose it.

You're on to something there!  If you're going to build it into something, you could use metal brackets instead of washers, and stamp the words into the side of the metal that goes into whatever you're building.

Or better yet, use door hinges.  Holy crap!  I think I love this idea.

Take the bathroom door off its hinges.  Stamp the words into the side of the hinge that goes against the door and the door frame.  Put the door back up.

Every single time you use that door, you'll smile.  If anybody asks why, just tell 'em you had a truly exquisite bowel movement.