In the vast world of cryptocurrency, where fortunes can change in a heartbeat, the security of your assets is paramount. Imagine leaving your prized possession—your seed phrase—unattended in a crowded marketplace. Just like a lost key to a vault, if it falls into the wrong hands, it could lead to a heist of epic proportions. In today’s lesson, we will explore an innovative solution to secure your seed phrases, namely Shamir Secret Sharing (SSS), a method that stands far superior to common homemade strategies like the 2 out of 3 split.
Through this exploration, you will learn how to bolster the security of your crypto assets, understand the math and crypto principles behind SSS, and ultimately, why you might want to avoid simpler methods that compromise your safety. Your key takeaways from this lesson include:
Get ready to deepen your understanding of crypto security and ensure that your digital vault remains locked tight.
In this lesson, the method we’ll dissect revolves around the revolutionary technique devised by Adi Shamir: the Shamir Secret Sharing scheme (SSS). This superior approach divides your seed phrase into multiple parts or “shares,” allowing for robust security. Unlike traditional methods such as the 2 out of 3 scheme, SSS ensures that a predetermined number of shares must be combined to reveal the complete seed phrase, thereby minimizing risk and vulnerability.
The essence of the video’s message is the unique benefit of SSS. By splitting your seed phrase while adhering to mathematical foundations, you can maintain control over your assets without exposing them to potential loss. The staggering contrast between the security levels of SSS and simpler methods establishes a clear thesis: security and simplicity can coexist, but only if you choose the right method.
To effectively utilize Shamir Secret Sharing, here’s a simple breakdown of the steps as highlighted in the lesson:
This method not only secures your assets from theft but also ensures that loss of some shares doesn’t entirely jeopardize your access. It guards against both loss and malicious attack, reinforcing the strength of your security measures.
Shamir Secret Sharing is an innovative compass in the turbulent sea of crypto security. Let’s outline its strengths and examine why it’s a crucial technique for any cryptocurrency enthusiast.
Robust Security: The method provides mathematical assurance that possessing a limited number of shares yields no useful information. For example, if you have a seed phrase split into six shares but require only three to reconstruct it, an attacker with just two shares cannot glean any information about your funds. This property fortifies your defenses against targeted attacks.
Customizability and Flexibility: SSS enables users to define both the total number of shares and the threshold required for recovery. This feature allows for personal tailoring of security protocols to fit individual risk appetites. Depending on your comfort level, you might choose to carry three shares while requiring only two for reconstruction. This adaptable nature enhances usability while maintaining maximum security.
Statistical Randomness: The mathematical construction underpinning SSS—polynomials—ensures that even if some shares are lost or compromised, the odds of successful recovery remain astronomically low. The inability to deduce missing data points from existing shares drastically mitigates the risk of successful brute-force attacks.
Future Compatibility with Technology: As cryptocurrency technology continues to evolve, so too do the mechanisms available for securing assets. SSS is compatible with specific hardware wallets like Trezor and Keystone, paving the way for its broader adoption within the crypto community.
While SSS is lauded for its effectiveness, it’s essential to recognize a few concerns surrounding its application. First, the level of understanding required to implement SSS may deter individuals not versed in cryptography. If the procedure feels overly complex, users might be tempted to revert to easier—but less secure—methods.
Moreover, the exclusivity of current hardware integration could create barriers to entry for users who may view SSS as unnecessary or complicated to manage. It’s vital for educational outlets to clarify that understanding and implementing this technology is paramount to ensuring asset safety, especially for those investing significant funds in cryptocurrencies.
Delving deeper into the world of cryptocurrencies and blockchain technology, Shamir Secret Sharing provides a crucial insight into the security landscape. In a decentralized financial (DeFi) ecosystem, where smart contracts and automated systems play a pivotal role, preserving access to user wallets becomes increasingly valuable.
In a world governed by decentralized applications (dApps), SSS plays an essential role in fostering security. For instance, if users can manage their wallets using shares from SSS, they benefit from distributed risk management—one of the fundamental tenets of the DeFi movement. SSS creates a secure environment where individuals can mitigate vulnerabilities while enjoying the advantages of blockchain-based systems.
Numerous blockchain projects are exploring the intersections between SSS and enhanced security measures. For example, decentralized custody solutions can leverage this technology, allowing users to engage in secure storage while retaining full ownership over their assets. By using SSS alongside apt security protocols, projects can empower users while decreasing the centralization risks present in traditional financial systems.
The implications of utilizing Shamir Secret Sharing extend beyond individual asset protection to influence the broader cryptocurrency and blockchain landscapes. As the industry continues to expand, the demand for secure storage and accessible solutions will accompany its growth.
By adopting frameworks like SSS, the future of asset security can evolve alongside technological advancements in cryptocurrencies. Using methods that prioritize cryptographic wisdom while remaining user-centric fosters an environment where more individuals feel empowered to participate in the digital economy confidently.
Moreover, should security solutions become standardized and integrated into wallets, users will inevitably enjoy enhanced confidence in managing their assets in a rapidly maturing environment. This could inspire greater participation in decentralized finance, ultimately leading to a paradigm shift in how finance operates.
As an expert navigating the ever-evolving landscape of cryptocurrencies, I have witnessed the challenges individuals face regarding security. A common narrative is the tendency to underestimate the complexity of safeguarding assets—more specifically, the dismissal of necessary security measures due to complexity or misunderstanding.
The beauty of Shamir Secret Sharing lies within its capacity to empower users while advancing decentralized finance. My observation is that the more individuals equip themselves with knowledge and understand these techniques, the better they can navigate the potential hazards of forgetting basic security measures. Embracing cryptographic principles like SSS is not merely prudent; it is vital in preserving the integrity of one’s crypto portfolio.
In summary, incorporating Shamir Secret Sharing into your crypto asset management approach significantly heightens security levels compared to conventional methods. With mathematical foundations bolstering its efficacy and customized approaches enhancing user adaptability, SSS represents a critical stride towards future-proofing financial security within the digital age.
As we traverse the realms of cryptocurrencies and blockchain technology, one thing remains clear: the need for solid security protocols is non-negotiable. SSS stands at the forefront of this necessity, illuminating pathways toward empowered ownership and resilience in the face of potential threats.
In today’s rapidly evolving digital landscape, the necessity for stringent security measures has never been more paramount, especially in the realm of cryptocurrencies. This lesson explores the importance of safely storing your seed phrase — the key that unlocks your crypto assets. We will delve into Shamir Secret Sharing (SSS), a robust method that significantly enhances security compared to traditional practices like the 2-of-3 split method. Let’s embark on this enlightening journey towards safeguarding your crypto assets!
Seed Phrase
Shamir Secret Sharing (SSS)
Threshold Scheme
Shares
BIP39 and SLIP39
Understanding these concepts is vital for newcomers to crypto as it equips them with the knowledge to protect their digital assets against potential threats and malfunctions inherent in less secure methods.
Key Points:
Explanation: This single point of failure is alarming as it could initiate a sequence of adverse events. In traditional finance, losing access to your bank account number—or worse, it being stolen—could have devastating effects, just like the potential loss of crypto funds through a compromised seed phrase.
Key Points:
Explanation: This method may seem appealing, but it limits the security provided by the seed phrase. Each part only offers 16 of the 24 words, significantly reducing the number of possibilities, thus weakening overall security from 256 bits to a mere 80 bits. One wouldn’t hand over the keys to the vault to three different people without utmost security—akin to how dangerous this homemade method is!
Crypto Connection: Relying on such a method could lead to horrible outcomes. Instead, SSS provides an incredibly robust system, ensuring that only sufficient information leads to access.
Key Points:
Explanation: The brilliance of SSS lies in its flexibility and the mathematical rigor behind it. By determining the number of shares and a threshold for recovery, individuals can safely manage their seed phrases. For example, one could split the seed into six shares while requiring just three for recovery. This way, losing a couple of shares does not endanger access to assets.
Crypto Connection: As crypto enthusiasts, utilizing SSS means embracing a security standard that mitigates many risks associated with traditional wallet safeguards.
Key Points:
Explanation: Visualize this as a mathematical graph; to define a specific curve (your secret), you need a certain number of data points. Remove one, and the curve can morph into countless shapes. Similarly, without the full threshold, potential attackers face infinite guessing—much like navigating a maze without a map.
Crypto Connection: Understanding this adds to the cryptocurrency toolkit by clearly illustrating why SSS is more secure compared to traditional methods, as it employs advanced mathematical principles.
Exploring how these principles from traditional finance align with or differ in the crypto realm can deepen understanding. For instance, SSS ensures that only by satisfying the required threshold of shares will the original information be revealed—making unauthorized access near impossible. It’s like doubling the vault doors and requiring two different keys for entry. This principle is exemplified in projects like Trezor, a hardware wallet that already supports this innovative method.
Scenario with Traditional Method:
Scenario with Shamir Secret Sharing:
Historically, technology has seen a surge in demand for enhanced security, from encrypting sensitive information to implementing robust authentication measures. Similarly, crypto has evolved with heavy focus on securing user assets. The recent rise in thefts and hacks within the cryptocurrency ecosystem underscores the dire need for systems like Shamir Secret Sharing.
When a seed phrase is compromised, users lose access to funds—an immediate and direct impact. Conversely, by utilizing SSS, not only can access be correctly managed, but loss incidents diminish profoundly. Crypto projects employing these standards often see higher trust levels among users, driving adoption.
Challenges:
Solutions:
By grasping these essential points, newcomers can effectively navigate the intricate world of digital asset security.
Now that you have armed yourself with the knowledge to secure your seed phrase effectively, get ready to delve deeper into the fascinating world of cryptocurrencies in the next lesson.
Stay tuned as we continue our exploration in the Crypto Is FIRE (CFIRE) training program, bridging traditional financial wisdom with innovative blockchain solutions!
In the world of cryptocurrency, where fortunes can rise and fall with the click of a button, safeguarding your seed phrase isn’t just important—it’s vital! Imagine this: you finally invest in your dream Bitcoin stash only to lose it all because you skimped on backup storage. Terrifying, right? This lesson delves into the crucial topic of metal seed phrase storage solutions, comparing budget-friendly and high-end options, and revealing how much you really need to protect your digital assets effectively.
By the end of this lesson, you will be able to:
So, grab your notepad, and let’s ensure your crypto investments will weather any storm!
This lesson will explore the comparative analysis of metal seed phrase devices, highlighting the results from extensive testing conducted by Jameson Lopp on 49 different devices.
The theme revolves around durability and functionality—two essential components for proper seed phrase storage. Each device was rigorously assessed for its ability to withstand extreme heat, corrosive substances, and physical damage. The findings revealed a spectrum of reliability, providing insights into which options prove worthy of a place in your security arsenal.
The process of selecting an effective seed phrase storage option involves understanding product categories and their respective strengths and weaknesses. Here are the key steps derived from the lessons outlined:
Identify Categories of Devices: Understand the six methods that passed all tests:
Test Exposures: Each device was subjected to tests simulating real-world threats:
Evaluate Performance: Record the outcomes of each test:
Filter Products: Focus on options rated B or higher by Jameson to ensure you choose reliable products.
Price Comparison: Check various pricing structures, including devices with and without tools. Consider bulk purchases for cost-effectiveness.
Review Data Concealment: Understand the implications of visible data if tampering is suspected.
These steps will arm you with the knowledge necessary to secure your cryptocurrency investments gracefully and effectively.
The comprehensive analysis of seed phrase storage highlights several standout features that make metal devices essential for cryptocurrency security.
Durability Under Extreme Conditions: The testing regime included extreme temperatures, corrosive acids, and mechanical forces. “Most punch devices did amazing,” demonstrating that these methods are more robust against wear.
Variety of Storage Options: The evidence implies there’s no one-size-fits-all solution. The “punch category” emerged as the most reliable, while tile storage repeatedly faltered, which can be crucial for informed decision-making.
Adaptive Cost Solutions: Lopp’s investigation revealed alternatives that cater to various budgets, from budget-friendly DIY solutions like the SAFU ninja method to pricier, aesthetically pleasing options such as the CryptoTag.
Pragmatic Testing: Lopp emphasizes that “a backup is not a backup until it’s been tested.” This mantra serves as a crucial reminder that verification is key to assuming any backup’s reliability.
While these points paint a compelling case, it’s valid to acknowledge some potential weaknesses. For instance, some DIY methods might seem overly labor-intensive or may sacrifice aesthetics for utility—a point worth considering depending on individual preferences.
The connection between the seed phrase storage discussion and the broader cryptocurrency ecosystem is profound and significant. Seed phrases are critical in the context of owning, transferring, or restoring digital assets, making their storage paramount.
One notable example is the use of steel washers in DIY solutions. This method ensures that an individual can create a scalable and long-lasting storage solution that significantly reduces the risks associated with conventional paper backups, which can be easily destroyed by fire or water damage.
Moreover, the emergence of decentralized finance (DeFi) adds another layer of complexity to the discussion. As users become more immersed in DeFi platforms, the need for secure seed phrase management escalates. Ensuring that seed phrases are stored safely in hardware or through reliable services could potentially prevent unauthorized access to users’ crypto wallets.
As cryptocurrency adoption grows, the dialogue surrounding seed phrase security will likely take center stage. Modern financial literacy demands individuals understand not only how to invest but also how to protect their digital wealth against loss. This is especially relevant considering the increasing trend of hacks and scams in the crypto realm.
Looking ahead, we might witness developments in more advanced storage technologies, potentially incorporating biometric or multi-signature security to further safeguard assets. The integration of blockchain technology into traditional finance also underscores the need for robust security solutions, as digital currencies cannot be entrusted to the same custodial practices that have characterized traditional banking.
As an expert in finance and technology, my exploration into seed phrase storage has illuminated many paths toward optimizing personal security. The fragility of traditional methods highlights an imperative need to reframe our approach to wealth storage in the digital age.
The significant variance in product effectiveness reinforces a principle I often emphasize: due diligence is crucial. While there’s an array of aesthetically designed options, you must prioritize what provides the best security first and foremost.
Safeguarding your seed phrase is not just a precaution; it’s a non-negotiable strategy for crypto enthusiasts who wish to secure their assets. The detailed insights into various storage options provided in this lesson equip you with the knowledge necessary to make informed choices.
As the cryptocurrency landscape continues to evolve, so too must our strategies for securing it. Remember, every decision you make today could have lasting implications for your financial future. Let’s navigate this journey into the next lesson of the Crypto Is FIRE (CFIRE) training program.
When it comes to safeguarding your cryptocurrency investments, few aspects are as crucial as your seed phrase – the gateway to your digital wallet. In today’s lesson, we will delve into effective methods for storing seed phrases using metal devices that provide durable protection against various challenges, including heat, corrosion, and physical damage. Given the vulnerabilities associated with traditional storage options, understanding the best practices in both traditional finance and crypto is vital for newcomers navigating the increasingly digital landscape. By reinforcing your knowledge in this area, you align your strategies with the Crypto Is FIRE (CFIRE) training plan, equipping yourself for long-term success.
Seed Phrase
Durability Testing
BIP39
DIY Solutions
Shamir Secret Sharing
Detailed Explanation: Your seed phrase, often consisting of 12 to 24 words, serves as the critical access point to your cryptocurrency wallet. It is imperative to understand that losing this phrase can result in the irreversible loss of assets. Simply writing the phrase on paper can expose you to potential theft, fire, or water damage. This is where metal storage devices come into play, providing a robust alternative designed to survive extreme conditions.
Detailed Explanation: Jameson Lopp has pioneered the testing of seed phrase storage devices, attempting exposure to extreme environments, including a 2000-degree Fahrenheit flame, which mimics real-life scenarios like house fires. Devices are then doused in cold water to replicate sudden temperature changes, followed by acid testing to evaluate resistance against corrosion. Interestingly, the tile category often succumbs to failure, whereas punch devices tend to succeed, offering a significant lesson for users on which categories to prioritize when selecting a storage solution.
Detailed Explanation: When choosing a device, cost is an important factor, but it should not overrule durability. Devices like the Bitplate Domino are touted as efficient, affordable options for users, whereas the CryptoTag stands as a premium choice. Weighing these criteria against levels of accessibility and peace of mind underscores the importance of making informed decisions that align with your security needs.
Detailed Explanation: For the cost-conscious, DIY methods can provide a reliable alternative to more expensive options. By employing methods like using stainless steel washers to store seed phrases, users can achieve delightful scalability. The SAFU ninja method, which involves stamping the first four letters of each BIP39 word onto multiple washers, is particularly effective. Choosing sturdy materials, like 304 stainless steel, ensures durability over time.
In the crypto ecosystem, durability testing, as exemplified by Jameson Lopp’s methods, sets a higher standard for how we assess information security compared to traditional financial systems. Certain crypto projects advocate for the production of resistant and secure hardware that people can trust with their assets.
The principles behind BIP39 have driven forward the conversation around wallet access and recovery. In conjunction, the DIY creative outlet allows savvy crypto investors to align their financial decisions with their budget without compromising security.
Historically, the loss of seed phrases has led to countless sobering stories of financial ruin, and conversely, robust storage mechanisms have allowed fortunate few to regain access to lost assets. Much like ensuring your offline bank account or valuables are safely secured, establishing methods for seed phrase protection mirrors those same principles, ensuring that neither traditional nor digital wealth is left to chance.
As you embark on your cryptocurrency journey, applying these insights will help solidify your security strategies, ensuring that your investments remain safe.
With this grounded approach to securing your seed phrase, you’ll be well on your way to comfortable investment in the digital financial arena.
Armed with the knowledge from today’s lesson, let’s delve deeper into securing your financial future as we explore the next topic in the Crypto Is FIRE (CFIRE) training program. Happy learning, and see you in the next session!
Best Metal Seed Phrase Storage Comparison (Cheap VS Expensive)
Transcript:
If you want to store your seed phrase on a metal device to make sure it will last a lifetime, what are the best options? Unfortunately, a lot of expensive seed phrase storage devices get annihilated when it comes to heat, corrosion, and physical damage, the exact things they’re supposed to protect against.
So which products will last and which won’t? And do you have to shell out $100 or can you get a bomb-proof option for much cheaper? Luckily, a guy named Jameson Lopp has already rigorously tested 49 different seed phrase devices against heat, corrosion, and physical damage. After spending several hours reading and cataloging all the results into a more searchable and sortable spreadsheet, this video will condense the time it takes you to digest all the information on its website. In addition, with the spreadsheet I’ve made, you’ll be able to sort by all the
different parameters that matter to you like device style, whether or not the data is concealed for tamper evidence, the grade it received on each test, the price, the price with tools, and the price for three separate devices if you need multiple. Most of that information isn’t searchable or sortable from Jameson’s website, but I’ve got to give credit where credit is due, and it all goes to him.
On the spreadsheet, I’ve only listed the products that are still available for purchase. Some products have doubled in price since Jameson originally posted, so you can be confident that what you are seeing on my spreadsheet has the up-to-date information. If you’re watching this video a year from now, let me know if anything is out of date, and I’ll update the spreadsheet as well as include the revision date for everyone’s benefit.
Now let’s summarize the results. There are six categories of devices that passed all the tests. handwritten with an electrical dremel. taking a metal stamp and hammering the letters onto plates. similar to engraving but not motorized, just scratching your letters with a really sharp tip. One method even uses a mini acid bath to deepen the scratches.
using a hammer and punch to make holes or deep indents on a plate, stacking, by stacking pre-made letters onto a rod, and finally, tiles, where you sort pre-made letter tiles onto a metal holder. To prove each device could stand the test of time, Jameson exposed each one to a 2000 degree Fahrenheit flame for 10 minutes, then dunked them in cold water after to simulate a house fire and sudden cool down that would come from firefighters putting out the fire.
Then Jameson put them in strong acid for 12 hours to make sure they could withstand corrosion, then crushed them under a hydraulic press, just for good measure. The category that failed the most frequently was the tile category. The heat caused the devices to warp in non-uniform ways and tiles would pop out of place, leading to permanent data loss.
The acid had similar effects, and if it passed the first two tests, then the compression and bending in the third test would pop the tiles out of place even more. Only two tile devices passed all the tests, Symbit and CypherWheel. Beyond those two, this is the category I’d avoid. The category that succeeded the most frequently was the Punch category.
Big indents and chunky pieces of metal is difficult data to erase or obscure. The only time this category ran into problems was when the lines delineating the data wasn’t deeply engraved enough. Then you’d have a harder time determining what letter or number each indent corresponded to. This was rare, though, and most punch devices did amazing.
As for the rest of the categories, some products did great while others did poorly. It was just more product specific. To help narrow your decision, I’ve only included products on the spreadsheet that were rated a B or higher by Jameson. You might start by sorting the spreadsheet by price, then sorting by device style.
When you do this, you’ll get a comment-only version of my spreadsheet. So to properly sort the spreadsheet, click a column, then Data, Sort Sheet through A to Z. Then, edit your temporary Sort Sheet through A to Z. Then, edit your temporary filter by changing A1 to A2. This will put filters on top of each column so you can sort by whatever field you want.
The reason there are four different price categories is because I thought it would be helpful to know the costs with and without tools. Do you already own metal stamps, a punch, or an engraver? Or do you know someone you could borrow it from? I also calculated the cost of purchasing three devices because I wanted to see how well the costs scaled.
If you want multiple backups, or you choose to do a Shamir secret sharing scheme, then it’s important to know how much buying three will cost. You can also sort by currency because products listed in your local currency will probably have reduced shipping costs. I also want to explain what the Data Concealed column means. This refers to whether or not an onlooker could just see the data by looking at the device.
The reason some people might want this is so that they can put it in a tamper evidence bag to know if the data has ever been exposed while in storage. If Jameson adds more test results in the future, I’ll be sure to add them in. After spending hours with all the different results, I have some recommendations.
If you’re looking for a one-and-done solution, easy to set up, easy to read, bomb proof, I’d get the Bitplate Domino. Specifically, the Bitplate Domino 1, because that way you don’t have to do any of the double dot patterns required for smaller bitplate options. But if the double dot pattern doesn’t bother you, then you can get one of the cheaper bitplate options. Currently, it is 55 euros for the Domino One and €40 for the Pocket Domino.
If you want something that will take the least amount of time and hassle to set up, then the Black Seed Ink Plate is a great option. Basically, just write your letters while pressing hard. You can tell from the pictures it’s not quite as bomb-proof as some of the other options, but it definitely passed all the tests.
It retails for $27, and if you buy three, it only comes out to $16 apiece. If you are going for the cool factor, then CryptoTag is a sleek-looking option. It’s expensive though, currently retailing for $129. Ouch. Kind of feels like you’re paying for marketing because, according to Jameson’s tests, it doesn’t seem like there’s any additional security in comparison to a typical punch plate.
Also, Zeus, which is the cheaper of the two, has you store the BIP39 numbers rather than storing the first four letters of your BIP39 words. So there’s a higher chance of a transcription error than just saving the first four letters of each word. The version that lets you stamp the letters rather than the numbers is the Thor, the $350 option.
If you’ve never used a seed storage device before, you might be confused as to why some devices only let you store the first four letters of each word. You will need the full word when you go to restore your account, so why only store a part of the data? The reason is because the words have a special property. There are no two words that will ever share the first four letters.
So, to save space, you don’t need to store the whole word. To see this list, go look up the BIP39 word list. If you’re cheap, like me, then I’d go for the SAFU ninja method. You buy 24 stainless steel washers, then stamp a number onto it for your word order, then the first four letters of each word onto each washer.
You can also buy a stamp guide to make hammering the stamps in easier and look a lot more appealing. This is also the most scalable solution because you can get washers even cheaper if you buy them in bulk. Another cheap DIY or do-it-yourself option is the Safe Seed DIY, which is also relatively cheap. In general, for DIY solutions, you’re looking for stainless steel, copper, or titanium.
Just make sure to avoid aluminum because of corrosion and warping at temperature. If you do go with stainless steel, I’d try to stick to a 304 stainless steel. For reference, that is what is used in the Sappho Ninja test with the washers. Grade 304 stainless steel is great against corrosion but won’t survive being stored long term in saltwater.
I’m not quite sure why you’d want to do that, but if you did and you were some scuba diving pirate treasure hunter, then research grade 316 stainless steel or other marine solutions. Another product from Jameson’s test I feel is worth mentioning is the Crypto Key Stack. I feel like it got a lot of things right.
It looks cool You can buy it with or without the logo and it comes with an electric graver all for $45 and it performed great on All the tests. So those are my recommendations Feel free to look through the rest of the spreadsheet to see if there’s an option you’d like better if you’re watching this video Then it means you’re serious about securing your crypto So please remember this a backup is not a backup until it’s been tested If you haven’t tested your words to properly restore your account, a backup is not a backup until it’s been tested. If you
haven’t tested your words to properly restore your account, then it’s not a true backup because you may have written it down wrong. Don’t trust yourself that you did it right. Verify it so you can be 100% sure. And while we’re on the topic of securing our seed phrase, I’d recommend learning two more concepts if you aren’t familiar with them already.
Go look up what a BIP39 passphrase is, called a 25th word, and what a Shamir secret sharing scheme is. Of the two, Shamir is my favorite, but they are both used to protect against different scenarios. Good luck securing your crypto, and thanks for watching.