Secure seed phrase storage: 2026 practices
How to write down, split and store a TON wallet seed phrase in 2026 — paper, metal, hardware wallets, and Shamir Backup schemes in practice.
- Author
- TON Adoption Team · research desk
- Published
Contents21sections
- What a seed phrase is and why it is critical
- Storage tiers by asset size
- What does NOT work: typical mistakes
- What works: solution tiers
- Tier 1 — paper backup in a safe
- Tier 2 — metal backup
- Tier 3 — Shamir Backup (SLIP-39)
- Tier 4 — Multi-sig
- Hardware wallet: why it is a must from $2,000
- BIP-39 passphrase: extra defence
- Our team’s setup
- What to do if the seed is compromised
- Core principles — no fluff
- Common failure scenarios and how to avoid them
- Scenario 1 — single copy lost
- Scenario 2 — written down with a typo
- Scenario 3 — cloud-synced photo
- Scenario 4 — passphrase forgotten
- Scenario 5 — trusted person betrays
- Cold-storage setup checklist from scratch
- Sources
A seed phrase is the only thing separating the wallet owner from a thief. Lose the seed — lose the wallet forever. Compromise the seed — lose funds in minutes, no recovery. This guide is 2025–2026 practice — what works, what does not, and which setups actually pay off for different sums. No brand promotion, with risks and trade-offs spelled out.
What a seed phrase is and why it is critical
A seed phrase (mnemonic, recovery phrase) is a sequence of 12 or 24 English words from the BIP-39 standard list. From it, all the wallet’s private keys are derived deterministically. In practice that means:
- If you have the seed, you can restore the wallet in any compatible app — Tonkeeper, MyTonWallet, Tonhub all see the same balances.
- If somebody else stole the seed, they do the same thing from their device. No permission or confirmation from the owner.
- A TON transaction finalises in 5 seconds. Between seed leak and an empty wallet — seconds, not hours.
That is why all TON scam schemes ultimately reduce to two goals: steal the seed or trick the victim into signing a transaction. Detailed map — in the TON top scams piece.
Storage tiers by asset size
Security is always a balance of convenience and risk. Simple mental model by sum:
| Amount | Storage type | Medium |
|---|---|---|
| Up to $200 | Hot wallet (Tonkeeper / Wallet) | On phone, seed in cloud password manager with 2FA |
| $200–2,000 | Hot wallet plus physical backup | Phone plus paper backup in a safe |
| $2,000–20,000 | Tonkeeper plus Ledger / Trezor | Hardware wallet plus metal backup in one location |
| $20,000+ | Multi-sig or Shamir Backup | Minimum two geographic locations, metal, optional passphrase |
Not dogma — common sense. If you hold an amount whose loss would actually change your life, time to upgrade tier.
What does NOT work: typical mistakes
What we see in users that leads to losses.
- Screenshot of the seed in the phone gallery. iCloud / Google Photos auto-syncs to the cloud. A leak of Apple ID or Google credentials leaks the seed.
- Seed in a Saved Messages chat in Telegram. Telegram Cloud is not end-to-end encrypted. Account hijack via SIM-swap gives the attacker full chat access.
- Seed in a desktop file. Any trojan, keylogger, or admin-level OS reads it in seconds. Especially dangerous on machines with pirated software or random crypto tools.
- Only one copy. Fire, flood, moving, a left-behind bag on a trip — and access to tens of thousands of dollars is gone. Real stories repeat every year.
- Memorising. 24 random English words after 5 years is almost guaranteed loss. Memory is not reliable for cold storage.
- Splitting in half stored separately. That lowers each half’s entropy to a level that is brute-forceable on a GPU. If you split — only via Shamir.
What works: solution tiers
Tier 1 — paper backup in a safe
The most basic and surprisingly decent option. Cost — zero, defence sufficient up to $2–5K.
How to do it right:
- Write the 24 words by hand on two sheets of thick paper. Do not print — the printer caches.
- Verify recovery: enter the recorded seed in a fresh wallet app, confirm balance and address match the original. A critical step — half the lost wallets died on a recording typo.
- Place the sheet in a waterproof zip bag, then in a safe or locked box. Second sheet — in another physical place (relatives, office desk).
- No “TON wallet seed” labels — just 24 words, no context.
Tier 2 — metal backup
Standard for serious sums. Steel plates with engraved or stamped words survive fire up to 1400°C, water, corrosion and physical destruction.
Real 2025–2026 products:
- Cryptosteel Capsule — stainless steel, manual letter screws. $79–99.
- Trezor Keep Metal — AISI 304 aviation steel, plate fixation. $60–120.
- Coinplate Alpha — German steel, 1400°C tolerance, $50–90.
- DIY — a steel plate with an engraver for $30–40 if you have the tools.
Same principles as paper: 2 copies in different places, recovery test before “locking” in a safe, no comments or marks.
Tier 3 — Shamir Backup (SLIP-39)
If the sum substantially exceeds $10K, splitting the seed m-of-n (e.g. 3 of 5) makes sense. Any 3 of 5 fragments restore the seed; fewer than 3 give no information even theoretically.
- Trezor Model T natively supports SLIP-39.
- Convenient to spread fragments across cities or trustees with different threat profiles.
- Downside — more complex implementation, higher chance of recovery error after years. Test the recovery procedure once a year.
Tier 4 — Multi-sig
Alternative to Shamir. The wallet signs transactions through 2–3 different private keys on different devices. On TON multi-sig is supported by Tonkeeper and the official multi-sig wallet contract.
Suits teams (DAO, funds) and individuals managing significant assets. For a private user usually overkill, but at $50K+ worth considering.
Hardware wallet: why it is a must from $2,000
Ledger / Trezor principle — the private key never leaves the device. Any transaction, even on a compromised computer, must be confirmed by a physical button on the device, with the user seeing the details on the embedded screen.
What this gives in practice:
- A drainer site can ask to sign a malicious transaction, but with a hardware wallet attached the user sees the recipient address and amount on the device screen and notices the swap.
- A trojan on the computer cannot extract the seed — it is physically not transferred to the host.
- On theft of the hardware wallet, a 4–8 digit PIN blocks access; after several wrong tries the device wipes.
Real models for TON in 2026: Ledger Nano S Plus / X / Stax (supported via Tonkeeper and MyTonWallet), Trezor Model T (via third-party integrations).
BIP-39 passphrase: extra defence
The 24 words can be supplemented with an arbitrary password — the “25th word”. This passphrase turns one seed into an arbitrary number of distinct wallets (one per passphrase). Without the passphrase you see an “empty” decoy wallet; the real funds are inside the passphrase wallet.
That gives rubber-hose defence (when an attacker physically forces seed disclosure) — you can show a $50 decoy without exposing the main wallet.
Use conditions:
- Store the passphrase separately from the seed. Together they defeat the point.
- Forgetting the passphrase means losing the wallet — no backup mechanism.
- Make the passphrase meaningful (a long phrase of non-obvious words), not “12345” — brute force is real.
Our team’s setup
What to do if the seed is compromised
If you typed the seed into a suspicious site, left paper exposed, or suspect a trojan on your computer — act immediately.
- Create a new wallet on a clean device with a fresh seed.
- Move all assets from the old wallet to the new one. Largest jettons (USDT) first, then TON, then NFTs.
- Destroy the old seed — the old wallet is permanently compromised and must never be used again.
- Check tonscan on the old wallet address — see if any malicious approvals or contracts are already attached.
Core principles — no fluff
- The seed lives only in the physical world (paper, metal) and the wallet app’s memory. No clouds, no chats, no files.
- Minimum 2 copies in different places.
- Recovery test before “sealing” — mandatory.
- From $2,000 — Ledger or Trezor.
- From $20,000 — Shamir Backup or multi-sig.
- BIP-39 passphrase — for serious sums, with strict separate storage.
- Twice a year — recovery drills.
Common failure scenarios and how to avoid them
From real recent stories.
Scenario 1 — single copy lost
User wrote the seed on one sheet and put it in a drawer. Two years later, after a move, the sheet is gone. Wallet unrecoverable — $25K on it.
Fix — never make a single copy. Minimum two, in different physical places.
Scenario 2 — written down with a typo
Seed recorded but never tested via recovery. A year later, on import to a new device — balance zero. Letter or word-order error somewhere.
Fix — after recording, mandatory test recovery in a new app and address comparison. Only then store the original.
Scenario 3 — cloud-synced photo
User took a screenshot of the seed “for five minutes, to send to the laptop”. The screenshot landed in iCloud Photo Stream. Six months later the iCloud account is breached via password leak — attacker finds the screenshot, imports the wallet, drains funds.
Fix — never screenshot or photograph the seed. Ever. Not even for 5 minutes.
Scenario 4 — passphrase forgotten
User used a BIP-39 passphrase for extra protection but did not write it down separately. Two years later memory fails — manual passphrase guesses lead nowhere. Wallet lost.
Fix — store the passphrase as a separate physical record, away from the seed. Test every six months not to forget.
Scenario 5 — trusted person betrays
User left a seed copy with a “trusted” relative for safekeeping. Three years later the relative figured it was a crypto wallet key and drained it.
Fix — passphrase plus Shamir Backup. A single fragment at a relative is useless without the others. Never put a full seed in someone else’s hands.
Cold-storage setup checklist from scratch
If you do not have reliable storage today, here is the step-by-step.
- Buy a Ledger Nano S Plus or Trezor Safe 3 from an official seller. Not a marketplace, not a “friend”, not the Amazon marketplace — only the official store or an authorised reseller. Tampered device equals seed leak on first power-on.
- Set up Ledger — generate the seed on the device; never enter a pre-existing seed during fresh device setup.
- Record the seed on paper, then on a metal backup. Make 2 metal copies, spread across locations.
- Run a test recovery — enter the seed into a Tonkeeper-seeder on a one-shot device, verify the address. Delete the app.
- Connect Ledger to Tonkeeper via USB or Bluetooth. Get your first address.
- Send a small test ($10–50) to that address. Confirm receipt.
- Only now move the rest of your savings to the Ledger address.
- Old seeds holding past balances — never reuse. Their leak may have gone unnoticed.
Sources
Frequently asked
Can I keep the seed in cloud notes or a password manager?
How many copies of the seed should I keep?
Paper or metal?
Should I split the seed into halves and store separately?
BIP-39 passphrase (25th word) — should I use it?
Can I use one seed for TON and other networks?
Related
- SecurityMar 15, 2026
Top 10 TON scams on Telegram and how to defend yourself
What schemes attackers run on Telegram against TON users in 2025-2026, real loss figures and step-by-step defence rules for retail.
- SecurityMar 24, 2026
Anatomy of phishing: how to spot a fake TON wallet site
Step-by-step breakdown of how attackers clone Tonkeeper and MyTonWallet sites, the markers that give away a fake