Seed phrases are a convenient way to backup a wallet while maintaining total and secure ownership. They do, however, have their disadvantages. If the seed phrase is lost or stolen, then the funds are at risk of being irremediably taken away. Another overlooked drawback is that planning inheritance would require entrusting the phrase to a third party, which once again places the funds at risk.
There's a straightforward, cryptographically secure way to solve those issues: "secret splitting". A 2-of-3 split produces 3 "shares", out of which any 2 can be used to recover the seed phrase. Each share can be stored in a separate location, and no single share can be used to guess anything about the seed phrase. Inheritance can be executed more securely, for instance by handing one share directly to an heir, and leaving another as part of a will.
Each share has a "Group:" area for that purpose. Write the brand and the model of the wallet securing the seed phrase, and the date of creation of the shares (i.e.: "Brand Model MM/DD"). This will serve as a unique identifier for this particular group of shares. This can also serve as a recovery hint: despite seed phrases being a standard, there might be compatibility quirks that can be avoided by sticking to the same wallet model.
Write the seed phrase in the "Secret"" section of the worksheet, ensuring only the gray fields are used and the numbering of words is preserved. If a word is more than 4 characters long, write only write the first 4 characters. If a word is only 3 characters long, use a "-" (dash) as the final character.
Tiles are a fast and reliable way to generate randomness if they are well-shuffled. The wash shuffle is similar to how children shuffle, i.e. by spreading the cards with both hands and mixing them arbitrarily. This is considered one of the most efficient ways to shuffle, and will ensure the security of the seed phrase. Note that this way of shuffling works best on a fabric surface.
Checksumming is essential for detecting and correcting any mistake that could happen during the phrase splitting process. It guarantees the soundness of the final result. To generate the checksums, use the wheel as follows:
This is the most demanding part of the process; it is advised that the user take a pause if they are beginning to lose focus. Deriving shares is done through a similar process to checksumming, but with a twist:
This step reveals any mistake that might have occured so far and guarantees the correctness of the shares.
Compute the checksums for shares B and C by following the process explained in "Generate the Checksums", and compare the results with the derived values. Each time the results differ, circle the 3 characters involved in the operation.
If mistakes were found, correct them as follow:
A successful checksum verification is normally enough to guarantee that all the shares are error-free. However, if this is your first time following this process, it is recommended to recover the first seed word to ensure that all the steps were followed correctly. This is also a way to verify for yourself that this method is sound.
To do this, follow the steps described in Recovering the Seed Phrase at the end of this guide, recovering the first word from shares B and C.
The "Secret" part of the worksheet can now be destroyed, as well as the original secret data. The other shares should be rewritten over using permanent ink. The shares must be kept separately, and no two shares must be accessible to anyone other than the wallet owner. Below is an example of secure share distribution:
This redistribution ensures that the wallet owner can perform on-site recovery without relying on the trusted person. Off-site recovery is also possible by comyining the trusted person's share with the share stored online. It is paramount that the trusted person shouldn't be able to easily access shares B or C outside of the inheritance process, and that any shares other than B remain fully offline.
It is advised to use water-proof containers such as stainless steel pill bottles to protect physically-stored shares against damages. If one of the share gets damaged, then the seed phrase can be recovered from the other 2 shares, and the damaged share can be derived again. If a share is lost or compromised, if the trusted person is no longer trusted, or if inheritance must be revoked, a new split followed by the destruction of the old shares will make the last remaining share useless.
To recover the seed phrase, pick two shares that belong to the same group. Using the table below, identify which one should be the outer share and which one the inner share. Take note of the solving window for these shares.
Outer Share | Inner Share | Solving Window | ||
---|---|---|---|---|
A | + | B | → | ① |
A | + | C | → | ② |
B | + | C | → | ① |
Print a worksheet to write the seed phrase, then follow these steps:
For error checking, recover and verify the checksum. If errors are found, solve them as indicated previously in Verifying the Checksums.