Seed Phrase
Ownership • Legacy • Access Control • Sovereignty
master key to wallet recovery
A seed phrase, also known as a recovery phrase or mnemonic phrase, is a human-readable set of 12 to 24 words that serves as a backup to recover a cryptocurrency wallet. It represents the private keys that control access to a wallet and should be stored securely and offline. Anyone with access to a seed phrase can take full control of the associated funds, making its protection critical for self-custody.
Use Case: A user’s phone is lost containing their Bifrost wallet. Using the 24-word seed phrase stored securely at home, they download the app on a new device, enter the words in order, and fully restore access to all their $FLR, $SGB, and NFTs within minutes.
Key Concepts:
- Private Keys — Cryptographic keys derived from the seed phrase
- Self-Custody — Full ownership enabled by controlling your seed phrase
- Hardware Wallet — Physical device that generates and protects seed phrases
- Cold Wallet — Offline storage keeping seed phrases away from internet threats
- Hot Wallet — Online wallet where seed phrase security is critical
- Crypto Wallets — All wallet types that use seed phrases for recovery
- Multisig Wallet — Multi-signature setup adding layers beyond single seed
- Paper Wallet — Physical backup method for seed phrases
- Air-Gapped Wallet — Completely isolated wallet for seed phrase generation
- BIP-39 Standard — Technical specification defining seed phrase word lists
- Mnemonic Phrase — Alternative term for seed phrase
- Recovery Phrase — Another common name for seed phrase
Summary: Your seed phrase is the ultimate key to your crypto wealth. It can restore your entire wallet on any compatible device, but in the wrong hands, it means total loss. Protecting your seed phrase is the single most important security practice in self-custody.
How Seed Phrases Work
the cryptography behind wallet recovery
Wallet generates random entropy • Converts to BIP-39 word list • 12-24 words selected • Order matters critically • One-time generation event
Words convert to binary seed • Master private key derived • Deterministic process • Same words = same key • Mathematical certainty
Master key generates child keys • Each chain gets derived keys • Unlimited addresses possible • All from single seed • HD wallet structure
Enter seed on any compatible wallet • Same addresses regenerate • Full access restored • Works across devices • Works across wallet apps
Seed Phrase Security
protecting the keys to your kingdom
✓ Write on paper immediately
✓ Store in multiple secure locations
✓ Use fireproof/waterproof storage
✓ Consider metal backup plates
✓ Memorize if possible (advanced)
✓ Test recovery before funding
✗ Screenshot or photograph
✗ Store in cloud (iCloud, Google Drive)
✗ Email to yourself
✗ Save in password manager
✗ Type into any website ever
✗ Share with anyone for any reason
• Fire destroys paper backups
• Water damages ink/paper
• Theft if location discovered
• Fading ink over time
• Natural disasters
• Death without succession plan
• Cloud storage hacks
• Malware keyloggers
• Phishing sites requesting seed
• Fake wallet apps
• Screenshot sync to cloud
• Clipboard monitoring
Seed Phrase Storage Methods
comparing backup options by security and durability
Seed Phrase Scams
how attackers try to steal your words
• Fake wallet websites
• “Connect wallet” asks for seed
• Lookalike URLs (metamask.io.scam)
• Google ads leading to fakes
• Browser bookmark tampering
Real wallets NEVER ask for seed online
• “Support” DMs on Discord/Telegram
• Asks you to “validate wallet”
• Links to seed phrase forms
• Impersonates official accounts
• Creates urgency/fear
Real support NEVER DMs first
• Fake wallet apps in app stores
• Browser extensions stealing input
• Keyloggers capturing typing
• Clipboard monitors for seed
• Screen capture malware
Only download from official sources
• “Friend” needing help with crypto
• Job offers requiring wallet setup
• Romance scams requesting seed
• Fake tech support calls
• “Verify ownership” requests
No legitimate reason to share seed
Hardware Wallet Advantage
why physical devices protect seed phrases better
• Seed generated on internet device
• Stored in browser/app memory
• Vulnerable to malware
• Screen visible during entry
• Clipboard accessible
• Computer/phone can be hacked
• Seed generated offline on device
• Never leaves secure chip
• Immune to computer malware
• Screen shows on device only
• Physical confirmation required
• Air-gapped from internet
• NFC card format
• No battery needed
• Tap to sign transactions
• Seed backup optional
• Mobile-first design
• Multi-card backup system
• USB/Bluetooth connection
• Secure element chip
• Screen for verification
• Wide coin support
• Ledger Live app
• Industry standard
Seed Phrase Recovery
restoring wallet access when needed
• Lost or broken phone/computer
• Switching to new device
• Wallet app deleted
• Moving to different wallet app
• Hardware wallet lost/damaged
• Upgrading wallet software
• Words written incorrectly
• Words in wrong order
• Missing one or more words
• Wrong wallet derivation path
• Seed phrase was compromised
• Never backed up properly
1. Download official wallet app
2. Select “Restore/Import Wallet”
3. Enter words in exact order
4. Set new password/PIN
5. Verify addresses match
6. Check all balances restored
• Use trusted device only
• Ensure no one watching
• Verify wallet app is official
• Check URL if web-based
• Test with small amount first
• Re-secure seed after recovery
Seed Phrase Checklist
essential practices for protecting your master key
☐ Generate on secure/offline device
☐ Write down immediately by hand
☐ Verify spelling of each word
☐ Confirm word order is correct
☐ Never type into computer/phone
☐ Test recovery before funding
☐ Store in fireproof location
☐ Consider metal backup plate
☐ Create second backup copy
☐ Store copies in different locations
☐ Never store digitally anywhere
☐ Tell no one the location
☐ Never share with anyone
☐ Ignore all requests for seed
☐ Verify backup annually
☐ Update estate plan if needed
☐ Consider hardware wallet upgrade
☐ Monitor for unauthorized access