Guide

Bitcoin Security Checklist

A structured walkthrough of every operational security practice that separates careful Bitcoin holders from easy targets. Seed storage, device hygiene, verification habits, and recovery planning.

A metal seed phrase backup plate beside a hardware wallet, a fireproof envelope, and a handwritten security checklist on a clean desk

This guide covers the operational security practices that protect your bitcoin once you hold your own keys. You will find detailed sections on seed phrase storage and metal backups, hardware wallet selection and setup, transaction verification habits, device hygiene, recovery planning including inheritance, and the common security mistakes I see repeated constantly. The checklist at the end consolidates everything into a single actionable reference. These recommendations come from over a decade of managing my own keys across multiple hardware wallets and security configurations. If you have not yet moved bitcoin off an exchange, the Self-Custody First Steps guide is the place to begin before working through this checklist.

Seed Phrase Storage

Your seed phrase is the master key to your bitcoin. Every satoshi you hold can be recovered, or stolen, with those twelve or twenty-four words. How you store them is the single most important security decision you will make.

Paper is the most common starting point, and it works for small amounts. But paper burns, dissolves in water, and degrades over time. For any meaningful amount, a metal backup is the standard. Stamped steel plates survive house fires, floods, and decades of storage. I have tested several brands over the years, and the ones that use individual letter stamps on thick stainless steel consistently outperform the cheaper punch-hole or etching alternatives in durability tests.

Geographic separation is the second layer. A single location is a single point of failure. If your house is burglarized and your seed phrase is in the desk drawer, everything is gone. Store your metal backup in a separate physical location: a safety deposit box, a trusted family member's safe, or a second property. The goal is to survive any single catastrophic event, whether it is theft, fire, or natural disaster.

Never store your seed phrase digitally. Not in a notes app, not in cloud storage, not in an encrypted file on your laptop. Digital storage introduces attack surfaces that do not exist with physical metal in a secure location. This includes photographs. A picture of your seed phrase on your phone is a breach waiting to happen.

Metal Backup Quick Rule

If you would be upset losing the amount of bitcoin you hold, it should be backed up on metal, stored in a separate location from your hardware wallet, and known to at least one trusted person who understands your recovery plan.

Hardware Wallet Selection and Setup

A hardware wallet keeps your private keys on a dedicated device that never exposes them to an internet-connected computer. This is the practical standard for self-custody. The device signs transactions internally. Your keys never touch your laptop, phone, or any networked system.

When selecting a hardware wallet, three things matter most: the manufacturer's track record for security disclosures and firmware updates, whether the device uses a secure element chip, and whether the software is open source or has been independently audited. Price is a distant fourth consideration. The difference between a good device and a great one is usually less than the cost of a modest dinner.

Setup should always happen on the device itself, never through a computer interface. Generate your seed phrase on the hardware wallet. Write it down on paper first, verify it by completing the device's built-in seed confirmation step, then transfer it to your metal backup. Once confirmed, wipe the paper copy by destroying it completely. Test your backup by wiping the device and restoring from the seed phrase before sending any meaningful amount of bitcoin to it.

Firmware updates should be applied promptly but verified first. Download firmware only from the manufacturer's official site. Check the checksum. Read the release notes. If a firmware update introduces a feature you do not need at the cost of changing something fundamental, it is acceptable to wait and monitor community feedback before applying it.

Transaction Verification Habits

Verification is a habit, not a one-time event. Every time you send bitcoin, you should verify the receiving address on your hardware wallet's screen before confirming the transaction. Every time. No exceptions.

Clipboard malware, which silently replaces a copied Bitcoin address with the attacker's address, has been in the wild for years. The only defense is physical verification on a device you trust. If the address on your hardware wallet's display matches the address you intended, proceed. If it does not, stop everything and investigate.

For large transfers, the standard practice is to send a small test transaction first. Send a trivial amount, confirm it arrives, then send the full amount. The fee for an extra transaction is a rounding error compared to the risk of losing a significant transfer to a wrong or compromised address.

Verify amounts as well as addresses. Review the transaction fee your wallet software is suggesting. During periods of high network congestion, fees can spike dramatically. A few seconds of review can save you from paying an unnecessarily high fee or, worse, confirming a transaction that was constructed incorrectly.

Device Hygiene

The computer you use to interact with your hardware wallet is a potential attack surface. It does not need to be a dedicated machine, but it does need to be maintained.

Keep your operating system updated. Use a reputable browser with extensions limited to what you actually need. Do not install software from unverified sources on the same machine you use for Bitcoin transactions. If you download wallet software, verify the download against the published checksum or GPG signature. The guidance published by NIST on cybersecurity hygiene applies directly here: reduce your attack surface, keep software current, and verify before you trust.

Browser extensions deserve special caution. Many browser-based attacks come through malicious extensions or compromised updates to legitimate ones. If you use a browser for accessing wallet interfaces, consider using a dedicated browser profile with minimal extensions specifically for that purpose.

Two-factor authentication should be enabled on every exchange account, email account, and service connected to your Bitcoin activity. Use a hardware-based 2FA key or an authenticator app. Never use SMS-based 2FA for anything related to Bitcoin. SIM swapping attacks are well-documented and continue to be effective against SMS verification.

Recovery Planning and Inheritance

Security is not just about keeping attackers out. It is also about making sure the right people can get in if something happens to you. This is the part most people skip, and it is arguably the most important.

A recovery plan should answer three questions: What assets exist? Where are the backups? How does someone access them? Document the answers in a way that a trusted person can follow without your help. This does not mean giving someone your seed phrase. It means leaving clear instructions about where to find the backup, what hardware wallet to use, and what steps to follow.

For inheritance specifically, consider a multi-signature arrangement where two of three keys are required to move funds. You hold one key, a trusted family member holds another, and the third is stored with a professional custodian or in a separate geographic location. No single party can access the funds alone, but any two can complete a transaction. This structure survives the loss of any one key or any one person.

Review your recovery plan annually. Hardware wallets get discontinued. Family circumstances change. Safe deposit boxes get reassigned. A plan that was sound three years ago may have gaps today. Set a recurring calendar reminder and walk through the entire recovery process at least once a year without actually moving funds.

Common Security Mistakes

After years of helping people secure their bitcoin, the same mistakes appear repeatedly. Recognizing them is the first layer of defense.

Storing seed phrases digitally. This includes screenshots, cloud-synced notes, password managers, and encrypted files. Every digital copy is a potential remote attack vector. Seed phrases belong on physical media in secure locations.

Using a single backup location. Your metal plate in a fireproof safe is excellent until someone breaks into your home. Geographic separation is not optional for serious amounts.

Skipping the test restore. If you have never wiped your hardware wallet and restored from your seed phrase, you do not know whether your backup works. Test it before the stakes are real.

Reusing addresses. Each Bitcoin address should ideally be used once. Most modern wallets generate new addresses automatically, but some users override this for convenience. The privacy and security cost is not worth the marginal convenience.

Ignoring firmware updates. Hardware wallet manufacturers release updates for a reason. Delaying indefinitely leaves known vulnerabilities unpatched. Apply updates promptly after verifying authenticity.

No inheritance plan. If you are the only person who knows how to access your bitcoin, your bitcoin dies with you. This is not a hypothetical problem. It has happened to people I know personally. Build a recovery plan and communicate it to someone you trust.

The Complete Security Checklist

Use this as a periodic audit tool. Review each item quarterly or whenever your custody setup changes. If you can check every box, your operational security is sound. If you cannot, prioritize the gaps. The Sovereignty Scorecard can help you assess which areas need the most attention.

Frequently Asked Questions

How often should I review my security setup?

At minimum, once a year. Set a calendar reminder for an annual security audit where you verify your backup is intact, your firmware is current, your recovery plan is still accurate, and your designated recovery person still has access to the instructions. If your life circumstances change significantly, such as a move, a marriage, or the birth of a child, review your plan immediately.

Is a passphrase in addition to a seed phrase worth using?

A passphrase, sometimes called the 25th word, creates an entirely separate wallet from the same seed phrase. It adds a meaningful layer of protection against physical theft of your seed backup. However, it also adds complexity: if you forget the passphrase, those funds are unrecoverable. Use a passphrase only if you can reliably store and recall it separately from your seed phrase, and make sure your recovery plan accounts for it.

Should I use a multi-signature setup?

Multi-signature wallets, where two of three or three of five keys are required to move funds, provide excellent protection against single points of failure. They are particularly valuable for inheritance planning and large holdings. The trade-off is increased complexity in setup, transaction signing, and key management. For most individuals holding moderate amounts, a single hardware wallet with a strong backup and recovery plan is sufficient. Multi-sig becomes worth the effort once your holdings justify the added operational overhead.

What should I do if I think my seed phrase has been compromised?

Move your funds immediately. Generate a new seed phrase on your hardware wallet, verify it, create a new metal backup, and transfer all bitcoin from the compromised wallet to a new address generated by the new seed. Do not reuse any addresses from the old wallet. Speed matters here. If someone has your seed phrase, they can move your funds at any time.

Is it safe to buy a hardware wallet from a third-party reseller?

Buy directly from the manufacturer whenever possible. If you must use a reseller, verify the packaging is sealed and tamper-evident. When setting up the device, always generate a new seed phrase on the device itself. Never use a device that arrives with a seed phrase already written down or a PIN already set. Those are signs of a supply chain attack.

Where to Go Next

If you are ready to take your first withdrawal to self-custody, the Self-Custody First Steps guide walks you through the process step by step. For the technical foundation behind everything covered here, see How Bitcoin Works. And the Start Here page provides a structured orientation if you want to explore the rest of the site.