Last Updated: November 21, 2025
Storage Methods
| Method | Threat model |
|---|---|
Hardware wallet
|
Protects private key from malware |
Paper backup
|
Stores seed offline |
Multisig
|
Requires multiple approvals |
Key Management
Ledger Live backup
Create recovery sheet
export-private-key
Avoid; prefer signing via devices
Set up cosign
Automate multisig signatures
Incident Readiness
Document approved recovery contacts, keep firmware updated, and rehearsed steps for theft response.
💡 Pro Tip:
Split seed phrases across trusted locations and test recovery regularly.