The Seed Phrase Debate: Do Crypto Wallets Actually Need Them? (2024)

Estimates suggest thatover a third of the current supply of bitcoin is made up of potentially lost or dormant coins. This statistic and the horror stories of people digging through landfills for a lost seed phrase continue to keep skeptics on the sidelines.

Industry experts have long debated how to solve this problem without losing the self-custody of the BIP39 seed phrase standard. For example, wallet manufacturers such as ZenGo and Argent launched seedless alternatives, but their critics argue that they sacrifice a degree of autonomy and censorship resistance for convenience.

And as the application layer of the crypto ecosystem grows, wallet manufacturers are competing to own the layer of user experience in Web3. The simple offline paper wallets of the early days in crypto can’t support this new demand for smart contract functionality and security.

Watch: The Wallet Wars: Rise of the SuperApp | Qiao Wang

But these developments also come with new risks. A recent report published by CertiK exposed malware that can steal the private keys of mobile wallets.

Noisy debate and increased complexity makes it even more difficult for average users to navigate the different ways to safely store their assets.

This explainer series on crypto wallets will attempt to make this journey a little less mind numbing. In this article, we will start with explaining the seed phrase debate and will follow up with a hot vs. cold wallets breakdown and then a full wallet security guide.

What is a seed phrase?

A seed phrase is a series of 12 or 24 random words that provides the data needed to recover a lost or broken crypto wallet. It is also known as a mnemonic phrase and is best understood as a security measure for self-custodied digital assets.

Both hot wallets and cold wallets can use a seed phrase for recovery. For example, MetaMask (hot browser extension wallet), Exodus (hot mobile wallet), and Ledger (cold hardware wallet) all use seed phrases for recovery.

The difference between seed phrases and private keys

Seed phrases and private keys are often used interchangeably, but they are different. The private key is a string of numbers and letters used to approve a transaction from an owner’s public address.

They are safely stored in wallets so that users don’t have to manually enter them everytime they want to approve a transaction. The wallet seed phrase provides the users with a way to recover that wallet if it is ever lost or broken. If for whatever reason someone gets access to a private key though, they can move the funds without using the mnemonic seed phrase. As in the case of the BombFlower Backdoor, hackers used wallet imitation malware to steal the private keys directly from users’ phones.

What’s the point?

A general driving force behind crypto and the push to self-custody is a distrust of the banking system and more specifically, ‘centralized entities.’ Many who have been burnt by custodial crypto platforms and are concerned with their country’s monetary policy want to take full ownership of their assets. We can save the merits of their reasons for another article, but the point self custody activists make is, if users want an alternative that is truly permissionless, they also need to take security into their own hands.

So don’t think of a seed phrase as a username or password. Because unlike online banking, there isn’t tech support available to verify identity and restore access. A better analogy is a fire-resistant safety box. Its effectiveness is completely contingent on how the owner uses it.

How seed phrase recovery works

One of the most widely-used standards for seed phrases is BIP39 (Bitcoin Improvement Proposal 39). And while it was initially proposed for bitcoin wallets, it became a popular standard across the board. It outlines how crypto wallets generate the phrase and reinterprets each word for wallet recovery.

The sequence of events is essential to understanding how this works. Before a user’s new public and private keys exist, a wallet automatically generates a seed phrase or asks the user to provide one. It is a mnemonic phrase that is made up of 12, 18 or 24 words.

The wallet software then converts the string of words into a binary seed (ones and zeros) and uses it to produce a set of private keys and public address pairings. BIP39 is not the only standard wallet manufacturers use in account creation and recovery.

They can also use BIP44 and BIP32. These standards work together with BIP39 and specify a tree structure for organizing addresses derived from a seed phrase. This method is often called a hierarchical deterministic structure and allows for the creation of multiple private/public key pairings and child pairings. This structure is important because it adds a layer of privacy and security protection by using a different address for every transaction.

Once users set up their wallet address and child public and private pairings, they don’t need to use the recovery seed phrase for access. Instead, they login to their hardware wallet (cold) or software wallet (hot) with a passcode or pin to automatically sign transactions. This keeps the private keys out of view from the public.

The backup seed phrase comes back into play if the user loses the device. In that event, the user should ideally have stored that seed phrase in a location separate from the cryptocurrency wallet. They would then use it to restore access on another compatible device.

Argument for seed phrase recovery

The seed phrase recovery system offers full control over the security and accessibility of crypto assets. By using standards such as BIP39, manufacturers can provide clear instructions for recovering private keys from other compatible wallets.

For example if two manufacturers use the popular combination of BIP32, BIP39 and BIP44 to create hierarchical deterministic wallets, then seed phrase recovery is compatible on both devices. This system can give users more control over their assets and also provides a safety net in case the wallet manufacturer is no longer in operation.

The seed phrase is protected from hackers if it is secured properly offline (on an air-gapped machine or device) and out of view from anyone else. But it is important to consider that depending on the wallet type, there are other security vulnerabilities outside of hackers accessing the keyphrase. We will cover these differences in greater detail in our full guide on crypto wallet security.

Argument against

The seed phrase creates a single point of failure. And its protection is not an easy endeavor, as it requires extensive knowledge on best practices. For example, users commonly store the seed phrase on paper. While this protects the phrase from online threats, it can easily become unreadable over time through natural wear and tear. For this reason, some use a prefabricated metal plate, also called a seedplate, with an etched version of the seed. But if they are stored in the same location of the wallet, they become subject to the same risks such as fire, natural disasters and theft.

If a seed phrase is stored on a computer or any device that can connect to the internet, then it is vulnerable to hackers. Even computers that are disconnected from bluetooth and wifi are prone to various malware that can expose the seed phrase.

These extra security measures add burdens to an already clunky user experience that average consumers are not accustomed to in Web2. And even if a user takes every precaution to protect the seed phrase, their wallet can still be hacked if it is not entirely offline and air gapped from any bluetooth connections.

What about seedless wallets?

A seedless wallet is a type of crypto wallet that does not rely on a single seed phrase for account creation and recovery. Instead, it uses multi-party computation (MPC) or smart contract technology to distribute key generation and signing processes among multiple parties or devices.

It is important to remember that the seed phrase was never a necessary component for wallet functionality. In the early days of bitcoin, users relied entirely on the private key for sending BTC. So seedless wallets are really just an alternative way to secure those private keys.

The main purpose of seedless wallets is to help users lighten that security burden. Like the seed phrase, these options still require more responsibility than traditional banking, but they use innovations aimed at removing the central point of failure in conventional seed phrase wallets.

Many institutions and decentralized autonomous organizations (DAO) are beholden to security compliance that requires these types of security solutions. And if implemented correctly, they can offer a secure alternative for people not wanting the burden of protecting their seed phrase. But they still have security risks and trade offs that some argue run counter to the spirit of decentralization.

Multi-party computation (MPC) protocols

MPC wallets use a technique called Threshold Signature Scheme (TSS) to remove the central point of failure in conventional wallets. Two examples include ZenGo (mobile) and Cypherock (hardware). TSS is a cryptographic method that allows a group of people or machines to generate and store a private key in such a way that no single person or device controls the entire key.

But unlike the popular multi-signature (multisig) wallets, MPC wallets don’t require multiple individual private keys to sign a signature. Instead, it divides one private key into separate shards. This distinction may sound semantical, but it unlocks more features and protections that multisig wallets can’t offer.

For example, many DAOs use multisig wallets to manage their treasury. If they wanted to add or move a participant, they would need to move their funds into another multisig wallet. Every time an organization is forced to move all funds to a different location, it opens them to a new set of unnecessary risks.

With MPC wallets, organizations can use something called a ‘private key rotation’ to recreate private key shards without moving funds.

Why does splitting the key help with security?

Mobile wallets can benefit from this approach because it prevents the entire private key from being stored on the device (a central point of failure). For example MPC wallets like ZenGo store the second key share on their servers. So, theoretically, if a hacker was only able to acquire one half of the key, they would be unable to approve any transactions without ZenGo’s permission.

According to a recent Twitter Space conversation with CertiK’s chief security expert, Kang Li, multiparty computation (MPC) is a safer method for transactions in general, as it requires multiple parties to sign. However, he warns that the level of security can vary depending on the implementation. In some cases, an attacker may only need one half of the key and a token from another signer to predict and sign a transaction, bypassing the need for the other half of the key. Li emphasizes that while MPC is generally a better scheme, it is important to pay attention to the details of the implementation to ensure the best level of security.

In the event that a MPC device is hacked or broken, the user still needs a way to recover the wallet. Mobile wallets such as ZenGo offer a crypto recovery service that would enable users to reinstate their wallet without using a crypto seed phrase. Upon downloading their wallet app, they provide instructions on setting up a recovery kit.

The recovery kit consists of two parts: a face scan and a recovery file. The face scan is performed locally and privately on the user’s phone. And the unique recovery file is stored in the user’s default personal cloud storage system.

As long as these two items are accessible on the user’s cloud, they can use it to authenticate ownership when redownloading the app.

Early concerns that hackers would be able to use a 2D image of a face to hack scans have proven to be false. However, a black hat hacker conference in 2019 proved that it was possible to trick the liveness detection of an Apple face scan using spectacles and black tape.

What if the wallet servers shut down?

This recovery system though is contingent on ZenGo’s servers authenticating ownership and the cloud service storing the recovery file.

In response to concerns of users being unable to access funds in the event that ZenGo shut down, ZenGo’s Chief Technology Officer Tal Be’eri told Blockworks that “recovery is indeed mandatory.”

“In the case of ZenGo going out of business, we have a trustee that would effectively release ZenGo remote share, and the app will be able to unite its personal share with the remote share and create a private key that can be mounted by many non-custodial wallets.”

This type of key recreation is very similar to the private key rotation made possible by the MPC protocol. If this wallet was a multisig wallet, the contingency plan would not be possible. Yet, while this does offer another layer of protection, it still requires the participation and permission of the trustee — a fact that self-custody maxis like to point out.

Final considerations

At the end of the day, this explainer only begins to scratch the surface of new alternatives to seed phrase wallets. There are still smart account wallets that unlock a whole new set of functionality in the Web3 world. The challenge with these new innovations is in understanding the complexity. But in the Web3 culture of ‘trust, don’t verify’, this increased complexity means that the vast majority of users will still end up trusting the company behind the decentralized and transparent systems.

This can present a problem because, according to Li, not all claims of decentralization are created equal. Upon investigation of certain wallets, Li and his team at CertiK discovered that these wallets were actually centralized, with key management and transaction signing taking place at a centralized location. Despite these centralized practices, the wallets continue to advertise themselves as decentralized.

Opponents of both sides of the seed phrase debate can agree that better education is needed. Without it, the technical transparency holds no real value to users.

Don’t miss the next big story – join ourfree daily newsletter.

I'm an expert in cryptocurrency and blockchain technology with a comprehensive understanding of the various aspects involved. My expertise is backed by extensive knowledge and experience in the field, keeping up to date with the latest developments and trends. I have a deep understanding of the concepts and technologies discussed in the provided article.

Now, let's delve into the concepts mentioned in the article:

  1. Lost or Dormant Bitcoins:

    • Over a third of the current Bitcoin supply is estimated to be potentially lost or dormant.
    • This phenomenon contributes to skepticism in the crypto space.
  2. Seed Phrases:

    • A seed phrase is a series of 12 or 24 random words crucial for recovering a lost or broken crypto wallet.
    • Also known as a mnemonic phrase, it enhances the security of self-custodied digital assets.
    • Both hot wallets (e.g., MetaMask, Exodus) and cold wallets (e.g., Ledger) use seed phrases for recovery.
  3. Seed Phrases vs. Private Keys:

    • Private keys are strings of numbers and letters used to approve transactions from a public address.
    • Seed phrases provide a way to recover wallets if lost or broken.
    • The BombFlower Backdoor incident illustrates the risk of hackers stealing private keys directly from users' devices.
  4. Seed Phrase Recovery:

    • BIP39 is a widely-used standard for seed phrases, outlining how wallets generate and interpret them.
    • The sequence involves generating a seed phrase, converting it to a binary seed, and using it to produce private keys and public addresses.
  5. Argument for Seed Phrase Recovery:

    • Seed phrase recovery provides users with control over the security and accessibility of their crypto assets.
    • Standards like BIP39 allow for clear instructions for recovering private keys from compatible wallets.
  6. Argument Against Seed Phrase Recovery:

    • Seed phrases create a single point of failure and can be challenging to protect effectively.
    • Storing seed phrases on paper introduces risks such as wear and tear, while digital storage is vulnerable to online threats.
  7. Seedless Wallets:

    • Seedless wallets, using Multi-Party Computation (MPC) or smart contract technology, aim to eliminate the central point of failure.
    • MPC wallets, like ZenGo and Cypherock, use Threshold Signature Scheme to distribute key generation and signing processes.
  8. MPC Protocols:

    • MPC wallets divide private keys into shards, offering security benefits over multisig wallets.
    • Private key rotation in MPC wallets allows key recreation without moving funds, reducing unnecessary risks.
  9. Security Concerns with MPC:

    • The security of MPC varies based on implementation details.
    • ZenGo's recovery system involves a face scan and a recovery file stored in the user's cloud, offering an alternative to seed phrases.
  10. Contingency Plans:

    • In case of ZenGo going out of business, a trustee can release ZenGo's remote share for wallet recovery, demonstrating a contingency plan.
  11. Final Considerations:

    • The article touches on the complexity of new alternatives to seed phrase wallets, including smart account wallets in the Web3 world.
    • Emphasis on the need for better education in the crypto space, as technical transparency may not align with actual decentralization.

In conclusion, the article provides a comprehensive overview of seed phrases, their recovery mechanisms, and explores alternative approaches like seedless wallets with Multi-Party Computation.

The Seed Phrase Debate: Do Crypto Wallets Actually Need Them? (2024)

FAQs

Can you guess a crypto wallet seed phrase? ›

Using large, random numbers to create wallets enables users to “open up a bitcoin account” without having to contact, trust or rely on anyone else. The large amount of theoretical wallets make it practically impossible for anyone to guess your seed phrase, not to mention “re-creating” your wallet by sheer accident.

Can someone steal your crypto with your seed phrase? ›

So, now you know that your seed phrase is a backup to all of your crypto wallet. This also means that if anyone else can get their hands on your set of 24 words, they can access your cryptocurrencies. As such, it's extremely important to keep your seed phrase secure.

Does my seed phrase work on any wallet? ›

Since the phrases are standardized and compatible with various wallet applications and hardware devices, users can easily switch between different platforms without losing access to their funds. In cases of device failure or loss, seed phrases provide a reliable method for recovering cryptocurrency wallets.

What is the seed phrase in a crypto wallet? ›

A seed phrase is a sequence of random words that stores the data required to access or recover cryptocurrency. Seed phrases are generated by crypto wallets and are crucial for the safety of digital assets. It's essential to keep a seed phrase safe and private as it can be used to regain access to a crypto wallet.

What are the odds of guessing a 12 seed phrase? ›

Guessing a seed phrase

People tend to think that it is easy to guess a seed phrase. However, remember that the possible word list contains 2,048 distinct words. Guessing a 12-word seed phrase in the proper sequence has a probability of 2048 to the power of 12.

Can a 24-word seed phrase be guessed? ›

So, now that we know this, there's hardly any need to use a 24-word seed phrase. To guess your seed phrase, you not only need 12 correct words. You will also need to put them in the correct order. With a current, most up-to-date computer, it will take a few billion years to find that combination.

Does trust wallet know my seed phrase? ›

Your seed phrase should be known by you and you only. Since Trust Wallet is also a non-custodial wallet, we don't own your wallet's private keys, and in the event that you lose them, you will have lost access to your account and funds.

Can I change my wallet seed phrase? ›

Changing the order of the words in a seed phrase will lead to a different master seed and, consequently, different private keys. Immutability of private keys and seed phrases: Once a private key and its corresponding seed phrase are generated, they cannot be altered.

What is an example of a 12-word recovery phrase? ›

Here is an example of a 12-word seed phrase: timber, sword, where, noodle, joy, eagle, admit, tuna, vibrant, museum, gossip, river. The standard method for seed phrases is called BIP-39 —short for Bitcoin improvement proposal-39. BIP-39 was introduced in 2013 with a list of 2,048 words that could be in seed phrases.

Should I take a picture of my seed phrase? ›

Write down your seed phrases on paper or metal.

Never store your seed phrase digitally. Do not type the words into a computer or take a picture of them. You can also purchase kits to store your seed phrase in metal, but never share your seed words with a third-party engraver or trophy shop.

Can two wallets have the same seed phrase? ›

2 Answers. Yes - one seed phrase can point to multiple addresses. Though one private key is only associated to one account.

Is a 12 word seed phrase safe? ›

Adequate Protection: With 2^128 possible combinations, the 12-word seed is a fortress against brute-force attacks. For most users, this level of security is more than sufficient to safeguard their digital assets.

How to solve seed phrase? ›

This approach requires dice, paper, pens, and a BIP39 word list. Using one die is optional; however, using multiple dice is preferable. Roll the dice and write down the random results on a piece of paper. After the required number of characters, you'll have generated a seed phrase.

Can I make my own seed phrase? ›

You could let your digital wallet generate a seed phrase for you. For very high security, you can "roll your own" seed phrase with dice or a calculator as offline methods. Computer-generated methods of random number or seed phrase generation are simpler, but can be hard to verify as safe and effective.

Can I recover my seed phrase? ›

Hire a data recovery specialist. This is a last resort option, and it is not guaranteed to be successful. Data recovery may work if the seed phrase was stored in a file and the file was subsequently deleted. Data recovery tools help retrieve deleted files, including the seed phrase.

Can someone guess my trust wallet phrase? ›

Could a Hacker Guess My Trust Wallet Phrase? The probability of a hacker guessing your recovery phrase is exceedingly low, bordering on the impossible. As a fun fact, a 12-word seed phrase offers an astonishing number of possible combinations—340,282,366,920,938,463,463,374,607,431,768,211,456 to be precise.

Is it possible to guess a private key? ›

The odd is very slim or if not impossible for one to guess the private keys or seed phrase of someone. This is because a seed phrase is an encoding of 256 bit entropy, which means that it can have 2^256 different seed phrase, a very big number.

What if someone finds my seed phrase? ›

If you think your seed phrase has been stolen or might be found by someone else: You should transfer your crypto into a new wallet as soon as possible and generate a new seed phrase. If you lose access to your wallet and lose your seed phrase: You will lose access to your crypto assets.

What is the 24 word seed phrase in crypto wallet? ›

When creating a Helium account, users are prompted to write down the 24-word seed phrase. This mnemonic phrase is generated from a list of 2048 specifically selected words and can be used to recover the private key of the account. The seed phrase should never be shared.

Top Articles
Wattpad Policies
Deduction vs. Expense: Do You Know The Difference?
Pieology Nutrition Calculator Mobile
Unitedhealthcare Hwp
South Park Season 26 Kisscartoon
Katie Boyle Dancer Biography
Craigslist Pets Southern Md
2024 U-Haul ® Truck Rental Review
Directions To Advance Auto
Pretend Newlyweds Nikubou Maranoshin
Craigslist Maui Garage Sale
Vegito Clothes Xenoverse 2
Stoney's Pizza & Gaming Parlor Danville Menu
Japanese Mushrooms: 10 Popular Varieties and Simple Recipes - Japan Travel Guide MATCHA
Regal Amc Near Me
How To Find Free Stuff On Craigslist San Diego | Tips, Popular Items, Safety Precautions | RoamBliss
Breckiehill Shower Cucumber
Walgreens On Bingle And Long Point
Dashboard Unt
Weather Underground Durham
Valley Craigslist
2021 Tesla Model 3 Standard Range Pl electric for sale - Portland, OR - craigslist
Obsidian Guard's Skullsplitter
Broken Gphone X Tarkov
South Florida residents must earn more than $100,000 to avoid being 'rent burdened'
Mrstryst
Craigslist Maryland Baltimore
ShadowCat - Forestry Mulching, Land Clearing, Bush Hog, Brush, Bobcat - farm & garden services - craigslist
Daily Journal Obituary Kankakee
Weekly Math Review Q4 3
آدرس جدید بند موویز
Family Fare Ad Allendale Mi
Tmka-19829
Flashscore.com Live Football Scores Livescore
Baywatch 2017 123Movies
Dr Adj Redist Cadv Prin Amex Charge
Hebrew Bible: Torah, Prophets and Writings | My Jewish Learning
Ise-Vm-K9 Eol
888-333-4026
Urban Blight Crossword Clue
Union Corners Obgyn
Tedit Calamity
Kutty Movie Net
Best Conjuration Spell In Skyrim
Big Brother 23: Wiki, Vote, Cast, Release Date, Contestants, Winner, Elimination
Where and How to Watch Sound of Freedom | Angel Studios
Glowforge Forum
Thrift Stores In Burlingame Ca
How to Find Mugshots: 11 Steps (with Pictures) - wikiHow
Guidance | GreenStar™ 3 2630 Display
Latest Posts
Article information

Author: Kieth Sipes

Last Updated:

Views: 6143

Rating: 4.7 / 5 (47 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Kieth Sipes

Birthday: 2001-04-14

Address: Suite 492 62479 Champlin Loop, South Catrice, MS 57271

Phone: +9663362133320

Job: District Sales Analyst

Hobby: Digital arts, Dance, Ghost hunting, Worldbuilding, Kayaking, Table tennis, 3D printing

Introduction: My name is Kieth Sipes, I am a zany, rich, courageous, powerful, faithful, jolly, excited person who loves writing and wants to share my knowledge and understanding with you.