Mcap -- BTC -- ETH -- SOL -- BNB -- XRP -- F&G -- View Market
Loading prices…

Seed Phrase

A list of 12 or 24 English words that encodes your wallet's master secret. Losing it means losing your crypto; leaking it means someone else gets it.

Wallets 5 min read

A seed phrase is a list of 12 or 24 words β€” usually drawn from a specific dictionary of 2,048 English words defined in the BIP39 standard β€” that encodes the master secret of a wallet. From the seed phrase, the wallet can deterministically derive every private key it will ever use, for every address, across every chain that follows the same derivation conventions. Backing up the seed phrase is equivalent to backing up the entire wallet. Losing the seed phrase with no backup is equivalent to losing everything the wallet held. Leaking the seed phrase to anyone β€” accidentally or deliberately β€” gives them the same control over the wallet that you have.

The BIP39 standard was published by Bitcoin developers in 2013 and has since been adopted almost universally across crypto wallets, including MetaMask, Ledger, Trezor, Exodus, Phantom (on Solana with slight variations), and most others. This near-universal adoption means that a seed phrase from one wallet can usually be restored into a different wallet software β€” a Ledger seed can be restored into a Trezor, a MetaMask seed can be imported into Rainbow, and so on. The compatibility is a deliberate design choice to prevent users from being locked into a single vendor. Your seed phrase is yours, not the wallet manufacturer’s.

The 12 Words Are Not Random

Each word in a BIP39 seed phrase encodes 11 bits of entropy, with the final word including a checksum derived from the previous words. A 12-word phrase represents 128 bits of entropy (minus the checksum, leaving 128 bits of effective security), and a 24-word phrase represents 256 bits. Both are cryptographically overwhelming β€” 128 bits is already beyond any conceivable brute-force search, and 24 words is chosen for additional safety margin in case future attacks reduce the effective strength.

The checksum is the reason you cannot just make up a sequence of 12 BIP39 words and expect it to be a valid seed. The last word’s bits have to match a specific hash of the previous words, and only 1 in 16 random combinations will pass the check. If you write down a seed phrase incorrectly and one word is wrong, the wallet software will usually detect the checksum mismatch when you try to restore, which is one of the few automated protections against backup errors.

How People Actually Lose Them

Every failure mode you can think of has happened.

Writing on paper that gets destroyed. Paper burns, gets wet, gets thrown out during moves, gets eaten by pets, fades over time. A single copy in a paper notebook is one of the worst backup methods, but it is extremely common because it is what wallets tell you to do and most users stop there.

Storing digitally in a compromised location. Photographs of the seed phrase in iCloud or Google Photos. Text files in Dropbox. Notes in a password manager that later gets breached. Emails to yourself. Any digital storage that is connected to the internet, or that can be accessed by anyone with your login credentials, is a terrible place to keep a seed phrase. The entire point of a non-custodial wallet is to avoid having your crypto keys on an internet-connected service; defeating that by storing the backup online is a common and preventable mistake.

Splitting incorrectly. Some users try to improve security by splitting their seed into pieces β€” the first half in one location, the second half in another. The problem is that a 12-word seed split in half still gives an attacker who finds one half substantial information (about 6 Γ— 11 = 66 bits of entropy is a feasible brute force at this scale). Proper secret-sharing schemes like Shamir’s Secret Sharing (used in Trezor’s SLIP39 format) do this correctly, but informal “split the phrase” approaches often do not.

Typing it into fake wallets. Phishing sites that look like legitimate wallet frontends have asked users to “recover” by entering their seed phrase, which the site then transmits to the attacker. This happens constantly. A legitimate wallet should never ask for your seed phrase after the initial setup β€” anything that does is a scam, with no exceptions.

Forgetting where it is. Some users do a good job of backing up the seed and then forget, years later, where they put the backup. If the wallet was rarely used, the forgetting can happen faster than you would expect. The backup is only useful if you can reliably find it when you need it, and “reliably” needs to cover the case where the need arises unexpectedly.

The Sensible Storage Practice

The current consensus best practice for non-trivial amounts of crypto is: write the seed on a metal backup plate (services like Cryptotag, Cryptosteel, and Billfodl sell these β€” or you can stamp it into stainless steel yourself), store the plate in a physically secure location, make a second copy in a geographically separate location, and never type the seed into any internet-connected device after the initial setup.

The metal backup protects against fire, water, and physical decay. The geographic separation protects against a single catastrophic loss (house fire, natural disaster). The offline-only rule protects against the broad category of phishing and malware. None of these steps are exotic, and following all three is within reach of any reasonably diligent user, but a surprising fraction of crypto users stop at “wrote it on a piece of paper once, no backup, have not checked it in years” and discover the consequences the first time they need to restore.

If there is one piece of crypto security advice that is universally correct, it is: protect your seed phrase like your life depends on it, because your wallet’s existence does.