This guide is a concise, practical checklist for crypto wallet security. It focuses on steps that reduce real‑world loss risk, with clear defaults.
TL;DR checklist
- Use a hardware wallet (or air‑gapped signer); disable blind signing
- Store the seed phrase offline (metal backup), never in cloud/notes/photos
- Add a passphrase (BIP‑39 25th word) and keep it separate from the seed
- For large funds, use multisig or MPC (t‑of‑n) with different device vendors
- Verify on‑device what you sign; prefer EIP‑712 typed data over arbitrary data
- Regularly revoke token approvals; use tight spending allowances
- Keep devices updated, locked down, and phishing‑resistant
- Back up securely; test recovery; document break‑glass steps
- Monitor addresses and set withdrawal limits/alerts where supported
- Segment funds across separate wallets (spend/trade/cold) to reduce blast radius
- Source hardware from official vendors; set strong PIN + passphrase day‑one
1) Choose the right wallet model (threat model first)
- Hot wallet (browser/phone): convenient but higher phishing/malware risk
- Hardware signer: private keys on device; confirm on‑device before signing
- Air‑gapped: QR/PSBT flow; excellent isolation, more friction
- Custodial: operational controls and insurance vary; assume API/insider risks
Rule of thumb:
- Daily spending: hot + hardware signer
- Treasury/savings: multisig/MPC with policy controls and multiple vendors
Segmentation:
- Maintain separate wallets for “spend,” “trading,” and “treasury” with different security policies
- Never connect treasury wallets to dApps; use them only for cold storage movements
- Do not reuse addresses across contexts; label wallets clearly in your tracker
2) Generate and store your seed phrase safely (BIP‑39)
Generate offline on the device, never on a connected computer or website. Back up on paper or metal; avoid digital photos or cloud sync. Consider adding a BIP‑39 passphrase (the “25th word”) for plausible deniability and extra protection.
Key tips:
- Never type seeds on an internet‑connected machine
- Keep seed and passphrase in separate locations; test recovery before funding
- Store backups in geographically separate locations; protect against fire/flood
- If using steel plates, ensure correct word order and checksum before sealing
3) Prefer hardware wallets and disable blind signing
- Ensure firmware is authentic and up to date
- Disable blind signing; require clear, on‑device prompts (address, amount, contract)
- For EVM chains, prefer EIP‑712 typed data signing over
eth_sign - Buy devices directly from the manufacturer or authorized resellers
- Use a strong PIN; enable passphrase; lock device on disconnect
- Turn off Bluetooth if not needed; avoid pairing on untrusted networks
4) Multisig or MPC for high‑value funds
- Use t‑of‑n with different device vendors and storage locations
- Require two‑person approval and policy controls (limits, time locks, allowlists)
- For EVM, consider Gnosis Safe (Safe Multisig) or enterprise MPC providers (with export and recovery plans)
- Document a recovery plan that works if one signer is lost or a vendor sunsets
- Separate approvers and initiators; log and review policy changes
5) Safer transaction signing (EIP‑712)
Typed data makes intent human‑readable and reduces phishing risk.
Recommendations:
- Always verify the domain (name, chainId, contract) and values on‑device
- Reject signing on unexpected chains or contracts; compare to your allowlist
- Beware signatures that grant approvals (permit, setApprovalForAll) or change owners
- Simulate transactions in a trusted simulator before final confirmation when possible
6) Token approvals and allowances
Unlimited approvals are a common loss vector. Use small, per‑use allowances and revoke after use.
- Review approvals regularly with a reputable revoke tool; clean up stale approvals
- Prefer per‑transaction or small‑limit approvals over “unlimited” allowances
- Maintain an allowlist of trusted spenders; verify before granting
- Set a recurring calendar reminder (e.g., monthly) to review and revoke allowances
- Pay special attention to NFT marketplace approvals and “Permit2” style delegations
7) Bitcoin PSBT: offline signing
Use PSBT for air‑gapped signing flows.
Tips:
- Verify addresses on-device; do not trust clipboard/QR alone
- Use descriptor‑based wallets to avoid address‑type mismatches
- Keep an air‑gapped signer dedicated to PSBT workflows; avoid mixing with hot usage
8) Encrypt hot keys at rest (apps and bots)
If you must store a hot key (market‑maker, bot), encrypt it with a strong key from a secrets manager and protect the host.
Hardening:
- Short‑lived hosts; minimal packages; no shared users; strict outbound firewall
- Limit key lifetime; rotate; scope API keys to specific actions
- Use an OS keychain, HSM, or reputable secrets manager; avoid plaintext keys on disk
- Restrict access with strong OS permissions and audit access regularly
- Separate hot keys from the app server role (e.g., sidecar or isolated service)
9) Device hygiene and phishing resistance
- Keep OS/firmware/browser updated; disable risky extensions
- Use dedicated devices/profiles for crypto; block USB autorun; prefer hardware keys (FIDO2) for accounts
- Type URLs; bookmark official sites; verify certificates; beware homograph domains
- Never import seeds to browser extensions unless absolutely necessary
- Use passkeys or TOTP (not SMS) for exchange/custodian accounts
- Treat “support” DMs and wallet pop‑ups with suspicion; verify via official channels
10) Backups and recovery
- Back up seed phrases on metal; store passphrase separately
- Consider Shamir Secret Sharing (SLIP‑39) or multisig for social recovery
- Practice recovery with a small amount; document break‑glass procedure
- Destroy scratch notes and printer memory; avoid photocopies/photos
- Include step‑by‑step recovery docs in sealed envelopes; test annually with a small balance
- Record derivation paths or wallet type to avoid restoration surprises
11) Monitoring and policies
- Watch addresses on chain; set email/SMS/Telegram alerts for large movements
- Use allowlists and spending limits when supported by custodians/wallets
- For teams: require two‑person review, time‑locks, and change management for policies
- Label addresses in your tracker; detect dusting attacks and ignore unknown tiny inflows
- Maintain a “known contacts” list to avoid clipboard/QR swap attacks
12) Supply chain and downloads
- Verify firmware signatures and checksums; download from official sources
- Prefer open‑source, widely‑audited libraries; pin versions; review permissions
- Be cautious with browser extensions; check permissions and maintainer history
- Store firmware files securely; do not install from links sent in chats
13) Operational and travel security
- Do not travel with your main seed; use a minimal balance travel wallet
- Keep devices and cables in your possession; avoid public chargers
- Use a VPN and trusted networks; avoid signing on shared or kiosk machines
- Prefer watch‑only wallets while on the move; defer actions until back in a trusted setup
14) Incident response (if something goes wrong)
- Move remaining funds immediately to a clean wallet you control
- Revoke approvals on affected addresses; rotate keys and change passwords
- In multisig setups, remove compromised signers and reconstitute with new keys
- Document what happened; notify impacted parties and tighten policies to prevent recurrence
15) Inheritance and succession planning
- Define who can recover funds and under what conditions (legal + technical)
- Use sealed instructions and time‑delayed access; consider professional executors
- Test the plan with small amounts and an external reviewer for clarity
16) Common scams to avoid
- Fake support or “refund” agents asking you to sign or share a seed
- Airdrop/drainer sites prompting unlimited approvals or blind signatures
- Malicious wallet updates and phishing sites with look‑alike domains
- QR/clipboard swapping malware redirecting your destination address
Final checklist
- Hardware or air‑gapped signer; blind signing disabled
- Seed phrase offline (metal) and passphrase stored separately
- Multisig/MPC with t‑of‑n and policy controls for large funds
- Typed data (EIP‑712) only; domains verified; unexpected chains blocked
- Token approvals minimized; stale approvals revoked
- Hot keys (if any) encrypted; hosts locked down; keys rotated
- Devices updated; phishing defenses in place; dedicated profiles
- Backups tested; clear recovery plan and break‑glass procedure
- Address monitoring, alerts, and withdrawal policies configured
- Wallet segmentation (spend/trade/treasury) enforced and labeled
- Incident playbook and inheritance plan documented and tested