Skip to main content

Guide

Bitcoin Security: Protecting Your Holdings Against Real Threats

Updated July 28, 202514–18 min read

Bitcoin security is the practice of protecting private keys from loss, theft, and coercion while keeping recovery feasible. Good security is not maximal complexity. It is a threat model and procedures you can actually maintain over time.

Key takeaways

  • Most losses come from ordinary failures: backup mistakes, phishing, and misplaced trust.
  • Security is key management: generation, storage, backup, and recovery.
  • Cold storage reduces remote attack surface, but procedures matter more than devices.
  • The best setup is the one that matches your amount, environment, and operational discipline.

In this guide

  1. Thinking about threats
  2. Key management fundamentals
  3. Cold storage and hardware wallets
  4. Multi-signature security
  5. Operational security
  6. Common attack vectors
  7. Security for custodial holdings
  8. Building defense in depth

Thinking about threats

Security without threat modeling is guesswork. Before choosing measures, understand what you're protecting against.

The three categories of loss

1. You lose access. Your keys are destroyed, forgotten, or inaccessible. No one can spend the bitcoin, including you.

2. Someone else gains access. An attacker obtains your keys through hacking, theft, or deception. They spend your bitcoin before you can stop them.

3. You're coerced. Someone forces you to transfer bitcoin through physical threat, legal compulsion, or manipulation.

Different measures protect against different categories. A steel backup protects against fire (category 1) but not against a burglar who finds it (category 2). A complex passphrase protects against theft but creates risk of forgetting (category 1).

Matching security to your situation

Your threat model depends on:

  • Amount at stake. Higher values justify more complexity.
  • Technical ability. Sophisticated setups are only secure if you can operate them correctly.
  • Physical environment. Do you have secure storage? Do you travel frequently?
  • Social environment. Who knows you hold bitcoin?
  • Time horizon. Security for a decade is different from security for a month.

There is no universal best setup. There is only what's appropriate for your situation.

As a baseline, start simpler than you think and add structure only when you can maintain it:

  • If you are learning, prioritize clean backup and recovery over clever features.
  • If the amount is meaningful, remove single points of failure (often with multisig or collaborative custody).
  • If heirs are involved, design for execution, not just secrecy.

The security-usability tradeoff

Security measures that are difficult to use tend to fail. You forget procedures. You take shortcuts. You make mistakes under pressure.

The goal is not maximum security. It's maximum security that you will actually maintain. A simpler setup used correctly is more secure than a complex setup you bypass or botch.

Key terms

  • Private key: The secret that authorizes spending bitcoin. Anyone with the key can move the bitcoin.
  • Seed phrase (recovery phrase): A list of words that can restore a wallet. Treat it like a master key.
  • Hardware wallet: A device that signs transactions without exposing keys to a general-purpose computer.
  • Multisig: A wallet requiring multiple keys to authorize a transaction (e.g., 2-of-3). See multi-signature.
  • 2FA: An additional login factor. Use authenticator apps or hardware keys. Avoid SMS for high-value accounts.

Key management fundamentals

Bitcoin security comes down to key management: how you generate, store, back up, and use your private keys.

Separate the wallet interface from the asset: a wallet app is a tool. Control lives with the keys.

Seed phrases

Most wallets use a seed phrase: 12 or 24 words that encode your private keys. Anyone with this phrase can spend your bitcoin.

Generation matters. Seed phrases should be generated by trusted software or hardware with proper randomness. Never use a seed phrase someone else gave you. Never generate one from a pattern you invented.

Physical backup is essential. Write it on paper or stamp it in metal. Never store digitally where it can be hacked.

Location matters. A backup in your home doesn't help if your home burns down. A backup in a bank safe deposit box may be inaccessible during a crisis.

Passphrases

A passphrase (sometimes called a "25th word") adds an additional secret. With a passphrase, someone who finds your seed phrase still can't access your bitcoin.

The tradeoff: if you forget the passphrase, your bitcoin is gone. Passphrases work for people with strong memory practices or secure passphrase storage. They're dangerous for people who might forget.

The backup paradox

Backups create security against loss but risk against theft. More copies mean more places an attacker might find them. Fewer copies mean higher risk of total loss.

The right number depends on your threat model: how likely is physical disaster versus theft? How much do you trust the locations?


Cold storage and hardware wallets

Cold storage means keeping keys on devices that never connect to the internet. This eliminates the largest category of attack: remote hacking.

Why cold storage works

Most bitcoin theft happens remotely. Attackers compromise computers through malware, phishing, or vulnerabilities. They search for wallet files and seed phrases. They wait for you to unlock a hot wallet.

Cold storage removes most remote attack paths. If your keys never touch an internet-connected device, remote attackers cannot directly extract them.

Hardware wallets

Hardware wallets are dedicated devices for cold storage. They hold keys in secure chips and sign transactions without exposing keys to your computer.

  • Buy from manufacturers directly. Devices from third parties may be tampered with.
  • Verify the device is genuine. Most manufacturers provide verification procedures.
  • Keep firmware updated. Vulnerabilities are discovered and patched.
  • Verify what you're signing. Confirm recipient address and amount on the device screen, not just on your computer.

Hardware wallets are not perfect. They can be lost, stolen, or fail. They are one layer, not a complete solution.

The operational challenge

Cold storage is only as secure as the procedures around it. If you enter your seed phrase on an internet-connected computer "just once," you've defeated the purpose.

Simple rule: keep seed phrases offline, and verify address and amount on a trusted display before signing.


Multi-signature security

Multi-signature setups require multiple keys to authorize a transaction. A 2-of-3 multisig requires any two of three keys to spend.

Why multisig matters

Multisig eliminates single points of failure:

  • No single key compromise is fatal. An attacker who obtains one key still can't spend.
  • No single person can act unilaterally. Reduces insider risk and coercion vulnerability.
  • One key can be lost without losing funds. With 2-of-3, you can lose one and still recover.

For significant amounts held long-term, multisig provides security that single-key setups cannot.

Common configurations

2-of-3 is standard. You control all three keys, stored in different locations. Any two can spend. Protects against single-key loss and theft.

3-of-5 provides more redundancy. Can lose two keys and still recover. Appropriate for very large amounts or organizations.

Collaborative custody involves a third party holding one or more keys, providing recovery assistance without unilateral control.

Multisig complexity

Multisig is more complex to set up and operate:

  • You must securely generate and store multiple keys.
  • You need to preserve the wallet configuration, not just the keys.
  • Spending requires coordinating multiple keys, which may be in different locations.

Multisig security is worth the complexity for amounts that justify it. For smaller amounts, the complexity may introduce more risk than it removes.

Read: Bitcoin Multisig Guide


Operational security

Technical measures fail when operational practices are weak. Most successful attacks exploit human behavior, not cryptographic vulnerabilities.

Information security

What you reveal affects your security:

  • Don't disclose amounts. The less people know, the less attractive you are as a target.
  • Secure communications. Assume email and SMS are not private. Use encrypted messaging for sensitive discussions.
  • Watch for reconnaissance. Unusual questions about your holdings or security are warning signs.

Physical security

Your digital security is limited by your physical security:

  • Where do you keep backups? Who has access?
  • Are you carrying devices or backup materials that could be lost or stolen?
  • Consider what an intruder could access with 30 minutes alone in your home.

Social engineering defense

Social engineering attacks manipulate you into compromising your own security:

  • Phishing. Fake websites or messages that trick you into revealing keys or sending bitcoin.
  • Impersonation. Attackers pretending to be support staff, friends, or authorities.
  • Urgency manipulation. Creating time pressure to prevent careful thinking.

Defense requires skepticism. Verify requests through independent channels. Take time before acting on urgent requests. Assume anyone asking for keys or seed phrases is an attacker, since legitimate services never need them.


Common attack vectors

Understanding how attacks happen helps you prioritize defenses.

AttackHow It WorksDefense
PhishingFake sites capture seed phrasesDownload from official sources only
MalwareSearches for wallet files, monitors clipboardHardware wallets, dedicated devices
SIM swappingCarrier transfers number to attackerAuthenticator apps, not SMS
Physical theftAccess to devices or backupsPINs, passphrases, secure locations
$5 wrench attackPhysical coercionDon't advertise holdings, duress wallets

Phishing and fake software

The most common attack is tricking users into giving up their own keys:

  • Fake wallet websites that capture seed phrases during "setup"
  • Malicious browser extensions that modify recipient addresses
  • Fake support that asks for seed phrases to "verify" accounts
  • Compromised software downloads that include malware

Defense: Download from official sources. Verify checksums. Never enter seed phrases on websites.

Malware

Malware can:

  • Search for wallet files and seed phrases stored digitally
  • Monitor your clipboard for bitcoin addresses and replace them
  • Log keystrokes when you type passwords
  • Wait for you to unlock a wallet, then try to drain funds

Defense: Keep systems updated. Don't install from untrusted sources. Use hardware wallets. Be aware of address substitution. Verify on a trusted display.

SIM swapping

Attackers convince your carrier to transfer your number to their SIM, then use SMS recovery to access accounts.

Defense: Don't use SMS for two-factor on important accounts. Use authenticator apps or hardware keys.

Physical theft

If someone gains physical access:

  • Hardware wallets can be stolen (PINs provide some protection)
  • Seed phrase backups can be photographed or copied
  • Computers can be accessed if not properly encrypted

Defense: Use PINs and passphrases. Encrypt devices. Secure storage locations.

$5 wrench attacks

Physical coercion: someone threatens you until you hand over bitcoin.

This is the hardest to defend against. Possible mitigations:

  • Do not advertise holdings (best defense is not being targeted)
  • Duress wallets (decoy wallets with small amounts)
  • Time-locked withdrawals
  • Geographic distribution of keys

Security for custodial holdings

If you use a custodian, your security depends partly on their practices and partly on yours.

Evaluating a custodian

  • Hot wallet exposure and controls. How much is kept online, and what limits access?
  • Multi-signature or distributed control. Multiple approval requirements?
  • Insurance. What coverage exists?
  • Security track record. Have they been breached? How did they respond?
  • Transparency. Do they publish practices? Independent audits?

Read: What Breaks Custody

Your account security

Even with a secure custodian, your account can be compromised:

  • Strong, unique passwords. Never reuse passwords.
  • Two-factor authentication. Authenticator apps or hardware keys, not SMS.
  • Verify withdrawal addresses. Confirm through multiple channels before large withdrawals.
  • Monitor activity. Set up notifications.
  • Be suspicious. Verify communications are genuinely from your custodian.

The tradeoff

Custodial holdings trade self-custody risk for counterparty risk. You no longer worry about losing keys, but you depend on the custodian's security and honesty.

For many holders, the answer is using both: some in self-custody for control, some with a trusted custodian for simplicity.

Our approach to security


Building defense in depth

Defense in depth means multiple independent layers. If one fails, others still protect you.

Layered security example

For significant self-custody holdings:

  1. Hardware wallet: Keys never touch general-purpose computers
  2. Multi-signature: Multiple keys required, stored in different locations
  3. Passphrases: Finding a seed phrase is not enough
  4. Geographic distribution: No single location contains enough to steal
  5. Operational discipline: Consistent practices without shortcuts

An attacker would need to defeat multiple layers simultaneously.

Avoiding single points of failure

Review your security. A single point of failure is any component whose failure alone would result in loss:

  • Is there one device that, if compromised, gives access to everything?
  • Is there one location that, if accessed, exposes all backups?
  • Is there one person who, if compromised or coerced, can take everything?
  • Is there one piece of information that, if forgotten, locks you out forever?

Each "yes" is a weakness to address.

Maintenance and documentation

Security degrades over time. Hardware fails. Software develops vulnerabilities. Circumstances change.

Schedule periodic reviews. Verify backups work. Update software. Reconsider whether your setup still matches your situation.

Document your setup clearly enough that you can reconstruct it if you forget details, trusted people can assist if you're incapacitated, and heirs can access holdings after your death.

Store documentation separately from the keys it describes.

Read: Bitcoin Inheritance Planning


Further reading


Further sources

FAQ

What is the most common way people lose bitcoin?Toggle answer
Not sophisticated hacks. It is ordinary failure: lost backups, phishing, malware, or mistakes under pressure. Security is mostly about eliminating predictable categories of failure.
Do I need a hardware wallet?Toggle answer
For meaningful amounts held long-term, a hardware wallet is a common baseline. It reduces common malware risks, but it does not replace good backups, address verification, and operational discipline.
Is cold storage 'perfect security'?Toggle answer
No. Cold storage removes most remote attack paths to keys, but you can still be tricked into authorizing a bad transaction, lose access through poor backups, or expose key material through mistakes.
When does multisig make sense?Toggle answer
When the amount is large enough to justify added redundancy and reduced unilateral control. Multisig reduces single points of failure, but it adds operational complexity that must be maintained.
What is the simplest security rule that avoids major losses?Toggle answer
Never enter a seed phrase into a website or share it with anyone. Treat it as a master key. Most irreversible losses start with seed phrase exposure or mishandling.

Custody built for the long term

Ficha is a bitcoin custody service for clients who think in decades. Full reserves. No lending. No yield products. Clear policies and predictable operations.