Skip to main content
T TON Adoption
Security GUIDE · 2026

Secure seed phrase storage: 2026 practices

How to write down, split and store a TON wallet seed phrase in 2026 — paper, metal, hardware wallets, and Shamir Backup schemes in practice.

Author
TON Adoption Team · research desk
Published
9 min read

A seed phrase is the only thing separating the wallet owner from a thief. Lose the seed — lose the wallet forever. Compromise the seed — lose funds in minutes, no recovery. This guide is 2025–2026 practice — what works, what does not, and which setups actually pay off for different sums. No brand promotion, with risks and trade-offs spelled out.

What a seed phrase is and why it is critical

A seed phrase (mnemonic, recovery phrase) is a sequence of 12 or 24 English words from the BIP-39 standard list. From it, all the wallet’s private keys are derived deterministically. In practice that means:

  • If you have the seed, you can restore the wallet in any compatible app — Tonkeeper, MyTonWallet, Tonhub all see the same balances.
  • If somebody else stole the seed, they do the same thing from their device. No permission or confirmation from the owner.
  • A TON transaction finalises in 5 seconds. Between seed leak and an empty wallet — seconds, not hours.

That is why all TON scam schemes ultimately reduce to two goals: steal the seed or trick the victim into signing a transaction. Detailed map — in the TON top scams piece.

Storage tiers by asset size

Security is always a balance of convenience and risk. Simple mental model by sum:

AmountStorage typeMedium
Up to $200Hot wallet (Tonkeeper / Wallet)On phone, seed in cloud password manager with 2FA
$200–2,000Hot wallet plus physical backupPhone plus paper backup in a safe
$2,000–20,000Tonkeeper plus Ledger / TrezorHardware wallet plus metal backup in one location
$20,000+Multi-sig or Shamir BackupMinimum two geographic locations, metal, optional passphrase

Not dogma — common sense. If you hold an amount whose loss would actually change your life, time to upgrade tier.

What does NOT work: typical mistakes

What we see in users that leads to losses.

  • Screenshot of the seed in the phone gallery. iCloud / Google Photos auto-syncs to the cloud. A leak of Apple ID or Google credentials leaks the seed.
  • Seed in a Saved Messages chat in Telegram. Telegram Cloud is not end-to-end encrypted. Account hijack via SIM-swap gives the attacker full chat access.
  • Seed in a desktop file. Any trojan, keylogger, or admin-level OS reads it in seconds. Especially dangerous on machines with pirated software or random crypto tools.
  • Only one copy. Fire, flood, moving, a left-behind bag on a trip — and access to tens of thousands of dollars is gone. Real stories repeat every year.
  • Memorising. 24 random English words after 5 years is almost guaranteed loss. Memory is not reliable for cold storage.
  • Splitting in half stored separately. That lowers each half’s entropy to a level that is brute-forceable on a GPU. If you split — only via Shamir.

What works: solution tiers

Tier 1 — paper backup in a safe

The most basic and surprisingly decent option. Cost — zero, defence sufficient up to $2–5K.

How to do it right:

  1. Write the 24 words by hand on two sheets of thick paper. Do not print — the printer caches.
  2. Verify recovery: enter the recorded seed in a fresh wallet app, confirm balance and address match the original. A critical step — half the lost wallets died on a recording typo.
  3. Place the sheet in a waterproof zip bag, then in a safe or locked box. Second sheet — in another physical place (relatives, office desk).
  4. No “TON wallet seed” labels — just 24 words, no context.

Tier 2 — metal backup

Standard for serious sums. Steel plates with engraved or stamped words survive fire up to 1400°C, water, corrosion and physical destruction.

Real 2025–2026 products:

  • Cryptosteel Capsule — stainless steel, manual letter screws. $79–99.
  • Trezor Keep Metal — AISI 304 aviation steel, plate fixation. $60–120.
  • Coinplate Alpha — German steel, 1400°C tolerance, $50–90.
  • DIY — a steel plate with an engraver for $30–40 if you have the tools.

Same principles as paper: 2 copies in different places, recovery test before “locking” in a safe, no comments or marks.

Tier 3 — Shamir Backup (SLIP-39)

If the sum substantially exceeds $10K, splitting the seed m-of-n (e.g. 3 of 5) makes sense. Any 3 of 5 fragments restore the seed; fewer than 3 give no information even theoretically.

  • Trezor Model T natively supports SLIP-39.
  • Convenient to spread fragments across cities or trustees with different threat profiles.
  • Downside — more complex implementation, higher chance of recovery error after years. Test the recovery procedure once a year.

Tier 4 — Multi-sig

Alternative to Shamir. The wallet signs transactions through 2–3 different private keys on different devices. On TON multi-sig is supported by Tonkeeper and the official multi-sig wallet contract.

Suits teams (DAO, funds) and individuals managing significant assets. For a private user usually overkill, but at $50K+ worth considering.

Hardware wallet: why it is a must from $2,000

Ledger / Trezor principle — the private key never leaves the device. Any transaction, even on a compromised computer, must be confirmed by a physical button on the device, with the user seeing the details on the embedded screen.

What this gives in practice:

  • A drainer site can ask to sign a malicious transaction, but with a hardware wallet attached the user sees the recipient address and amount on the device screen and notices the swap.
  • A trojan on the computer cannot extract the seed — it is physically not transferred to the host.
  • On theft of the hardware wallet, a 4–8 digit PIN blocks access; after several wrong tries the device wipes.

Real models for TON in 2026: Ledger Nano S Plus / X / Stax (supported via Tonkeeper and MyTonWallet), Trezor Model T (via third-party integrations).

BIP-39 passphrase: extra defence

The 24 words can be supplemented with an arbitrary password — the “25th word”. This passphrase turns one seed into an arbitrary number of distinct wallets (one per passphrase). Without the passphrase you see an “empty” decoy wallet; the real funds are inside the passphrase wallet.

That gives rubber-hose defence (when an attacker physically forces seed disclosure) — you can show a $50 decoy without exposing the main wallet.

Use conditions:

  • Store the passphrase separately from the seed. Together they defeat the point.
  • Forgetting the passphrase means losing the wallet — no backup mechanism.
  • Make the passphrase meaningful (a long phrase of non-obvious words), not “12345” — brute force is real.

Our team’s setup

What to do if the seed is compromised

If you typed the seed into a suspicious site, left paper exposed, or suspect a trojan on your computer — act immediately.

  1. Create a new wallet on a clean device with a fresh seed.
  2. Move all assets from the old wallet to the new one. Largest jettons (USDT) first, then TON, then NFTs.
  3. Destroy the old seed — the old wallet is permanently compromised and must never be used again.
  4. Check tonscan on the old wallet address — see if any malicious approvals or contracts are already attached.

Core principles — no fluff

  1. The seed lives only in the physical world (paper, metal) and the wallet app’s memory. No clouds, no chats, no files.
  2. Minimum 2 copies in different places.
  3. Recovery test before “sealing” — mandatory.
  4. From $2,000 — Ledger or Trezor.
  5. From $20,000 — Shamir Backup or multi-sig.
  6. BIP-39 passphrase — for serious sums, with strict separate storage.
  7. Twice a year — recovery drills.

Common failure scenarios and how to avoid them

From real recent stories.

Scenario 1 — single copy lost

User wrote the seed on one sheet and put it in a drawer. Two years later, after a move, the sheet is gone. Wallet unrecoverable — $25K on it.

Fix — never make a single copy. Minimum two, in different physical places.

Scenario 2 — written down with a typo

Seed recorded but never tested via recovery. A year later, on import to a new device — balance zero. Letter or word-order error somewhere.

Fix — after recording, mandatory test recovery in a new app and address comparison. Only then store the original.

Scenario 3 — cloud-synced photo

User took a screenshot of the seed “for five minutes, to send to the laptop”. The screenshot landed in iCloud Photo Stream. Six months later the iCloud account is breached via password leak — attacker finds the screenshot, imports the wallet, drains funds.

Fix — never screenshot or photograph the seed. Ever. Not even for 5 minutes.

Scenario 4 — passphrase forgotten

User used a BIP-39 passphrase for extra protection but did not write it down separately. Two years later memory fails — manual passphrase guesses lead nowhere. Wallet lost.

Fix — store the passphrase as a separate physical record, away from the seed. Test every six months not to forget.

Scenario 5 — trusted person betrays

User left a seed copy with a “trusted” relative for safekeeping. Three years later the relative figured it was a crypto wallet key and drained it.

Fix — passphrase plus Shamir Backup. A single fragment at a relative is useless without the others. Never put a full seed in someone else’s hands.

Cold-storage setup checklist from scratch

If you do not have reliable storage today, here is the step-by-step.

  1. Buy a Ledger Nano S Plus or Trezor Safe 3 from an official seller. Not a marketplace, not a “friend”, not the Amazon marketplace — only the official store or an authorised reseller. Tampered device equals seed leak on first power-on.
  2. Set up Ledger — generate the seed on the device; never enter a pre-existing seed during fresh device setup.
  3. Record the seed on paper, then on a metal backup. Make 2 metal copies, spread across locations.
  4. Run a test recovery — enter the seed into a Tonkeeper-seeder on a one-shot device, verify the address. Delete the app.
  5. Connect Ledger to Tonkeeper via USB or Bluetooth. Get your first address.
  6. Send a small test ($10–50) to that address. Confirm receipt.
  7. Only now move the rest of your savings to the Ledger address.
  8. Old seeds holding past balances — never reuse. Their leak may have gone unnoticed.

Sources

Frequently asked

Technically yes. In practice it is the worst option short of 'sticking a Post-it on a monitor'. A cloud account falls to phishing or SIM-swap, after which the seed is the attacker's. Any cloud service turns cold storage into hot storage.
Two-three physical copies in geographically separated places (home, relatives, bank deposit box). One copy is too fragile to fire or loss; more than three increases theft and leak risk.
For amounts up to $1–2K paper in a safe place is enough. From $5K and up move to metal — Cryptosteel or Trezor Keep Metal plates survive fire up to 1400°C, water and physical impact. Paper does not.
Splitting in half (12 + 12 words) is bad — it lowers each half's entropy and exposes it to brute force. The correct option is Shamir's Secret Sharing (SLIP-39) on Trezor Model T or a multi-sig wallet. Do not just split in half.
Yes, for serious sums. It is an extra password on top of 24 words that turns one seed into an arbitrary number of 'invisible' wallets. Downside — forgetting the passphrase means losing access forever. Carefully record it separately from the main seed.
Technically yes — Tonkeeper and MyTonWallet implement BIP-39 like Ethereum wallets. But we do not recommend it — a cross-chain seed expands the attack surface. Better to use a separate seed on a separate device for TON savings.

Related