30+ Best Places to Hide Your Cold Wallet

Updated April 2024

Cold wallets provide the most secure, sovereign and reliable way to self custody your crypto assets.  

When you assume the responsibility of safeguarding your crypto assets in cold storage, you will also need a plan to hide hardware wallet and recovery seed.  

Your crypto cold wallet is made up of two parts: device and seed. 

(Hardware Device) + (Recovery Seed)= Cold Wallet

If you don’t understand what I’m talking about, check out our post covering everything you need to know about cold wallets vs. hot wallets.

Tl;dr – You need to get a cold wallet to store your private keys on a crypto hardware device like this.  If you keep all of your coins in your exchange hot wallet you DO NOT own your keys and effectively have an IOU from the exchange that is not backed by a government insurance program like the FDIC.  

Hiding your Crypto Hardware Wallet Device

Hardware wallets secure your private keys.  

If your device falls into the wrong hands, a thief could compromise your crypto wallet if they have your Device Pin or Recovery Seed Phrase.

The best way to keep thieves away from your cold wallet is to NOT talk about your crypto.  

Pro Tip: Your pin should not be the same 4 digit code to disarm your security system or pull money out of the ATM.  

The Ledger Nano is an easy to use crypto wallet which gives you three chances to enter the correct Pin Code.  After 3 failed attempts, the device automatically resets and your private keys remain safe.

The only way to restore a new wallet or reset hardware wallet is to enter the correct recovery seed.  I almost lost all of my crypto because I couldn’t reproduce the entire seed.

A burglar considers the a) amount of time it will take to break in b) the noise their break-in will create (alarm, dog) and c) how visible they will be to neighbors who may report suspicious activity. Here’s an awesome home defense primer if you want to take your physical security to the next level.

Hiding your Crypto Wallet Seed Phrase

If you’ve created a PIN that isn’t too obvious to guess in three attempts then I wouldn’t sweat going out of the way to hide your Cold Wallet device.  

You’re going to need access to the hardware device more often than you think to make transfers from your exchange account after using our custom built DCA average price calculator.  

If anyone does get a hold of your cold wallet, they are more likely to brick the device than guess your Pin.  If your cold wallet bricks, gets lost or damaged you must have your seed phrase to restore the hardware wallet.  

So, while half of hiding your hardware wallet is hiding the device itself, the other half is hiding your private keys—and making sure you don’t hide these two things in the same place.

Secure your private key on a dedicated hardware wallet with a 12 or 24 word recovery seed + 13th or 25th word passphrase to backup and recover your Bitcoin wallet.

Pro Tip: A 24 word seed-phrase is twice as difficult to record and recover compared to a 12 word recovery seed when you consider that the security provided by bitcoin’s Elliptic-curve cryptography is 128 bits which is satisfied by a 12 word seed.

List of Do’s and Don’t for keeping your seed phrase secure:

✅ Do… ✅

  • Maintain personal operational security when you self custody Bitcoin.
    Use a fine point black sharpie to write your seed on the sheet provided by the wallet manufacturer.
  • Verify that your wallet can accept a small transfer from your exchange. 
  • Force your device to reset after the transfer, then use your seed to restore the wallet. 
  • Before you transfer your remaining balance, have a plan to hide your wallet and seed.
  • Keep a physical copy of the seed. Committing your seed to memory is no bueno.
  • Protect your seed from natural elements using fire and water secure storage.
  • Consider backing up your seed on a metal plate or washers
  • Never speak, write, type or otherwise share your seed with ANYONE!
  • Keep the firmware/software up to date.
  • Use VPNs when possible and avoid public WiFi networks.
  • Use 2FA or passwords to provide an additional layer of security.
  • Ask us questions (team@stratus.io).  If you have more than $100k in crypto, we have a private client group who can add an additional layer of legal protection for your cold storage. 

🚫Don’t…🚫

  • Don’t get too cute hiding or scrambling your seed or this could happen.
  • A hardware wallet does not come with your recovery sheet filled out.
  • Don’t store your seed in the cloud or on an electronic device.
  • No pictures, password managers or digital copies.
  • Don’t take pictures of your seed.
  • Don’t say your seed phrase on the phone, slack, or over VOIP.
  • Don’t write your seed if there are any physical or web cameras around.  
  • Don’t speak your seed words while you are writing them down.
  • Don’t rely on memorizing your seed unless you’re escaping a hostile environment.
  • NEVER EVER email your seed to yourself.
  • Don’t enter your seed into MetaMask and do not seed your wallet with a MetaMask seed.
  • Don’t click links. If you get an email from with a link, go to the website directly.
  • Rule #1 for cold storage, Don’t talk about your crypto!

Best Places to Hide Your Crypto Wallet Recovery Seed Words

Even though cold wallets provide offline security for your crypto, it is your responsibility to provide offline security for your cold wallet to prevent unauthorized access, loss or theft.

Here are a few creative and relatively secure ways to hide your crypto recovery seed:

  • Memory Techniques: Instead of writing down the recovery seed, you can use memory techniques to remember it. You could associate each word with a vivid mental image or create a story that links the words together. This way, you don’t have a physical record of the recovery seed, making it harder for someone to find it.
  • Steganography: Steganography is the practice of concealing information within other seemingly innocent files or data. You could use this technique to hide your recovery seed within an image, an audio file, or a video file. There are tools available that can help you embed the recovery seed into the chosen media file, making it difficult for others to identify.
  • Cryptic Notes: Instead of writing down the recovery seed explicitly, you could create a series of cryptic notes or symbols that only you can decipher. This could involve using a codebook, creating your own encryption system, or even utilizing a language that you have invented. The goal is to make the recovery seed unintelligible to others while still being understandable to you.
  • Splitting the recovery seed: Divide your recovery seed into multiple parts and store them separately in different secure locations. This could involve writing down a portion of the words on separate pieces of paper and hiding them in different places, such as inside books, behind picture frames, or in sealed envelopes. Requiring multiple pieces for reassembly adds an extra layer of security.
  • Multilayer Encryption: Encrypt your recovery seed using strong encryption software before storing it digitally. You could use password-protected file containers or encryption tools like VeraCrypt or 7-Zip to create an encrypted archive. This way, even if someone gains access to the file, they would still need the encryption password to retrieve the recovery seed.

From my experience, finding a a balance between security and accessibility is important. While these methods can be creative and provide some level of protection, always ensure that you have a reliable backup and that you can access the recovery seed when needed. 

It’s recommended to test your chosen hiding method thoroughly to avoid the risk of losing your recovery seed permanently.

30 ways to hide your crypto recovery seed without involving digital storage:

  • Engraving: Engrave your recovery seed onto a metal plate or other durable material and hide it in a secure location, such as behind a picture frame or inside a hollowed-out book.
  • Buried Container: Enclose your recovery seed in a sealed container and bury it in a discreet location in your garden or a remote outdoor spot.
  • Customized Artwork: Create a piece of artwork that incorporates your recovery seed in a subtle way. Hang it on a wall or display it in your home, ensuring that only you know the hidden message.
  • Puzzle or Riddle: Encode your recovery seed into a puzzle or riddle that only you can solve. Write the puzzle down and hide it in a secure place.
  • Safety Deposit Box: Rent a safety deposit box at a bank and store a physical copy of your recovery seed inside. Ensure the box is accessible only by you and keep the bank key in a secure location.  Only if you trust the government NOT to ever need to force their way in. 
  • False Bottom Drawer: Create a false bottom in a drawer or a piece of furniture and store your recovery seed beneath it. Make sure it blends in seamlessly with the rest of the item.
  • Secret Compartment: Build or modify an object with a secret compartment, such as a hollowed-out book, a false bottomed container, or a hidden compartment in a piece of furniture.
  • Family Heirloom: Use a family heirloom, like an old jewelry box or a vintage item, and hide your recovery seed inside it. Keep the item in a secure location or display it inconspicuously.
  • Camouflaged Object: Hide your recovery seed within an everyday object, such as a seemingly insignificant trinket or a decoration. Make sure it’s not easily distinguishable from other similar objects.
  • Hidden in Plain Sight: Write your recovery seed on a small piece of paper and hide it among other documents, like old receipts or irrelevant papers, in a drawer or filing cabinet.
  • Underground Container: Bury a sealed container with your recovery seed in a hidden underground location on your property, such as a PVC pipe or a waterproof container.
  • Locked Box: Use a secure lockbox or small safe with a combination or key lock to store your recovery seed. Hide the box in a well-concealed spot within your home.
  • Camouflaged Cryptex: Create a cryptex—a cylindrical device with a combination lock—where the recovery seed is hidden inside. Camouflage it as a decoration or integrate it into an existing item.
  • Disguised Object: Disguise your recovery seed within an object, such as a hollowed-out pen or a disguised USB drive. Ensure it doesn’t raise suspicion when seen by others.
  • Invisible Ink: Write your recovery seed using invisible ink and store it discreetly. Only you will know the appropriate method to reveal the hidden message.
  • Securely Stored Offsite: Utilize a trusted friend or family member’s safe deposit box or secure storage location to store your recovery seed, ensuring it remains accessible only to you.
  • Locked Luggage: Use a lockable suitcase or travel bag to store your recovery seed securely. Keep it in a safe place, such as a locked closet or a hidden storage area.
  • Hidden Wall Cavity: Construct a concealed cavity within a wall or under the floorboards to store your recovery seed securely. Ensure it blends in seamlessly with the surrounding structure.
  • Secured Vehicle Compartment: Install a hidden compartment in your vehicle, such as under a seat or within the trunk, to discreetly store your recovery seed while on the move.
  • Hardware Device Backup: Purchase a second dedicated cold wallet hardware device to act as a backup or decoy.
  • Inside a Sealed Bottle: Write down your recovery seed on a piece of waterproof paper and place it inside a sealed bottle. Bury the bottle in a remote location or hide it among other similar bottles.
  • Hiding in a Puzzle Box: Use a puzzle box with multiple compartments and intricate mechanisms to hide your recovery seed. Only by solving the puzzle will one gain access to the hidden compartment.
  • Behind a Removable Wall Panel: Install a removable wall panel in your home and hide your recovery seed behind it. Ensure the panel blends in with the surrounding wall and is securely attached.
  • Encrypted Tattoo: Get a tattoo that appears to be a random design or pattern but actually encodes your recovery seed. Only you will know how to decipher the hidden message.
  • Hidden in a Plant Pot: Bury your recovery seed within a sealed container at the bottom of a large plant pot. Use a plant that looks ordinary to avoid drawing attention.
  • Memorized Mnemonics: Instead of writing down the recovery seed, create a unique mental mnemonic system to remember it. Associate each word with specific memories or images that only you can decode.
  • Subtle Alterations: Make subtle alterations to an existing everyday item, such as adjusting the spacing or position of letters or numbers, to embed your recovery seed discreetly.
  • Microscopic Engraving: Use a specialized tool to engrave your recovery seed in microscopic font size on a small, inconspicuous object, like the edge of a coin or the tip of a key.
  • Hidden in a Musical Instrument: Conceal your recovery seed within a musical instrument by disassembling a part and storing it inside. Ensure it does not affect the instrument’s functionality.
  • Divided among Trusted Individuals: Split your recovery seed into multiple parts and share them with trusted individuals (such as family members or close friends). Each person holds only a fragment, making collusion necessary to reconstruct the complete recovery seed.

Remember to choose a hiding place that is safe from theft, damage, or accidental loss while ensuring that you can retrieve the recovery seed when needed.

Ranking 30 least to most likely hiding places to be compromised by natural events (fire, flood) and direct theft, considering their relative vulnerabilities:

Least likely to be compromised:

  • Memory Techniques
  • Memorized Mnemonics
  • Splitting the recovery seed among Trusted Individuals
  • Cryptic Notes
  • Invisible Ink
  • Engraving
  • Microscopic Engraving
  • Subtle Alterations
  • Divided among Trusted Individuals
  • Encrypted Tattoo

Moderate level of vulnerability:

  • Puzzle or Riddle
  • Safety Deposit Box
  • Personal Cryptocurrency Hardware Device
  • Locked Box
  • Hidden Wall Cavity
  • Locked Luggage
  • Hiding in a Puzzle Box
  • Hiding in a Plant Pot
  • Disguised Object
  • Inside a Sealed Bottle

Relatively more vulnerable:

  • Steganography
  • Buried Container
  • Camouflaged Object
  • Hidden in Plain Sight
  • Hidden in a Musical Instrument
  • Family Heirloom
  • Camouflaged Cryptex
  • Behind a Removable Wall Panel
  • Securely Stored Offsite
  • Underground Container

It’s important to note that the vulnerability of each method can vary depending on the specific circumstances, implementation, and the precautions taken to protect them. Consider factors such as the location, durability, accessibility, and likelihood of discovery when choosing a method to hide your recovery seed.

Note: Stratus does NOT provide investment, legal or tax advice.  All information in this article is for educational purposes and should not be interpreted as investment, legal or tax advice.  The opinions expressed are those of the author for informational purposes and neither Stratus nor the author are liable for any errors, inaccuracies or omissions.  Digital assets, such as cryptocurrencies or decentralized finance, present unique risks for investors.  For investment, legal, tax, or other financial guidance you should consult your own advisor.