Ledger Recover isn't new to the seed recovery game. Although different in their ways, the crypto space already has a few solutions that offer funds recovery in case of mishaps.
Cryptocurrencies are trustless by design, meaning they don't require users to trust a central authority to maintain the integrity of the blockchains they operate on or keep their assets secure.
But this comes with a major challenge — cryptocurrency users need to secure their own assets to truly leverage their unique benefits. This self-sovereignty ensures no third party has access to their funds, enabling true financial autonomy and freedom.
To help reduce this burden, Ledger recently announced an opt-in social recovery feature, which allows Ledger hardware wallet owners to split their seed and store each shard with a different trusted entity. By providing proof of identity and undergoing other checks, the user could retrieve their key shards from the custodians to recover their assets.
Here, we take a look at some of the most secure options.
Join us in showcasing the cryptocurrency revolution, one newsletter at a time. Subscribe now to get daily news and market updates right to your inbox, along with our millions of other subscribers (that’s right, millions love us!) — what are you waiting for?
Use a Multi-Signature Wallet
Though multi-signature setups are typically leveraged by businesses and other organizations, they can also be used by individuals to bolster their security and improve recoverability should they lose access to their private keys or seed.
Multi-signature wallets allow you to retain access to your funds even if you lose one (or potentially more) of your signing keys. If you create a 2-of-3 wallet, you can easily recover your funds if you lose 1 key, whereas a 4-of-7 wallet allows you to lose 3 keys without compromising your funds.
Related reading: Learn about Account Abstraction.
By creating a multi-signature wallet and storing the private keys in secure locations, you can easily access your funds even if a key is lost. You can then transfer your funds to a new multi-signature wallet and repeat the secure storage process to maintain your protection.
Today, many popular cryptocurrency wallets feature native multi-signature support. This includes Electrum and Specter (Bitcoin wallets) as well as Casa (Ethereum wallet). Some also offer an additional layer of security, thanks to hardware wallet support.
Shamir's Secret Sharing Method
Should you ever need to reconstruct your seed phrase, you then need to obtain enough shares from your trusted chunk holders. These chunks then be combined to form the secret. This process is known as social recovery.
The purpose of SSS is to distribute data among a group, such that no single individual can glean any information about the nature of the secret. If a single share is compromised, the attacker would not be able to reconstruct the secret. The attacker would need to access at least the minimum quorum number of shares to reconstruct the secret.
Shamir's Secret Sharing is used to divide a secret into n number of shares, such that any k number of shares can be used to reconstruct the secret. For example, you might divide a secret into n = 7 shares, requiring at least k = 4 shares to reconstruct the secret.
The system accomplishes this by using polynomial interpolation, whereby a secret is represented as a point on a polynomial curve, and shares are also points on that curve. By defining a threshold, you determine how many shares are required to reconstruct the polynomial and the associated secret.
This setup can be used to distribute your seed (as shares) to reliable individuals or entities since they will be unable to deduce any information about the nature of the secret without obtaining at least k number of shares.
Several well-known hardware wallets now support Shamir backups, including the Trezor Model T and Keystone Wallet.
Because of the risks of collusion or malware, it is necessary to take steps to securely generate and recombine the seed if using SSS — multiparty computation is one such way to achieve this.
Consider Multiparty Computation
Multiparty computation can be combined with Shamir's Secret Sharing technique to enable the trustless recovery of cryptocurrency seeds or private keys. Here’s how it would work:
- Secret Splitting: Use SSS to split the seed phrase or private key into 'n' shares in such a way that any 'k' out of these 'n' shares are needed to reconstruct the original secret (where k <= n). This is known as (k, n)-threshold secret sharing.
- Share Distribution: These shares should be distributed to trusted friends, family members, or other trustworthy individuals. It is important that these can be easily contacted or reached but are not known to each other to prevent collusion.
- Recovery: When you need to recover your seed phrase or private key, you will then need to contact at least “k” members of your secret sharing network and have them participate in the reconstruction process.
- Reconstruction: You can then use MPC software to combine the 'k' shares and reconstruct the original secret. This can be done in such a way that the individual shares are never revealed to any single party, including the owner. Through MPC, the shares can be used to perform the necessary computations to reconstruct the secret without the shares themselves being reconstructed.
Some institutional cryptocurrency custody solutions are known to leverage multi-party computation — Fireblocks being one prominent example.
Redundant Backups
One particularly simple but often overlooked way to protect your seed phrase and maximize recoverability is to keep backups stored in multiple geographic locations.
This will give you enough redundancy to protect your assets even in the worst-case scenarios — such as a natural disaster or war.
Today, there are a large number of robust seed and private key metal wallet storage solutions that can be combined with redundant geographic storage to provide robust protection against most potential calamities.
For an additional layer of protection, consider encrypting your seed phrase or private keys prior to inscribing it/them on a metal wallet using a cipher. You can then memorize the cipher decryption key to ensure only you can unlock your funds should your metal wallet backup ever be discovered by an unauthorized person.
Click here to learn more about securing your seed phrase.